Showing 1 - 11 results of 11 for search 'Guozhen SHI', query time: 0.02s
Refine Results
-
1
E-invoice authenticity verification scheme based on signature verification by Rongna XIE, Weihua MAO, Guozhen SHI
Published 2019-12-01
Article -
2
Encrypted traffic identification method based on deep residual capsule network with attention mechanism by Guozhen SHI, Kunyang LI, Yao LIU, Yongjian YANG
Published 2023-02-01
Article -
3
Attribute-based lightweight reconfigurable access control policy by Rongna XIE, Hui LI, Guozhen SHI, Yunchuan GUO
Published 2020-02-01
Article -
4
Scheduling algorithm for stochastic job stream cipher service based on load balancing by Li LI, Guozhen SHI, Kui GENG, Xiuze DONG, Fenghua LI
Published 2018-06-01
Article -
5
Redundancy and conflict detection method for label-based data flow control policy by Rongna XIE, Xiaonan FAN, Suzhe LI, Yuxin HUANG, Guozhen SHI
Published 2023-10-01
Article -
6
Proxy re-encryption based multi-factor access control scheme in cloud by Mang SU, Guozhen SHI, Anmin FU, Yan YU, Wei JIN
Published 2018-02-01
Article -
7
Privacy-preserving attribute ticket scheme based on mobile terminal with smart card by Rui SHI, Huamin FENG, Huiqin XIE, Guozhen SHI, Biao LIU, Yang YANG
Published 2022-10-01
Article -
8
Blockchain-based access control mechanism for data traceability by Rongna XIE, Hui LI, Guozhen SHI, Yunchuan GUO, Ming ZHANG, Xiuze DONG
Published 2020-12-01
Article -
9
Cross-network access control mechanism for complex network environment by Fenghua LI, Tianzhu CHEN, Zhen WANG, Linjie ZHANG, Guozhen SHI, Yunchuan GUO
Published 2018-02-01
Article -
10
Extended access control mechanism for cross-domain data exchange by Rongna XIE, Yunchuan GUO, Fenghua LI, Guozhen SHI, Yaqiong WANG, Kui GENG
Published 2019-07-01
Article -
11
Research on extended access control mechanism in online social network by Rongna XIE, Xiaonan FAN, Lin YUAN, Zichen GUO, Jiayu ZHU, Guozhen SHI
Published 2021-10-01
Article