Showing 1 - 17 results of 17 for search 'YANG Yi-xian', query time: 0.02s
Refine Results
-
1
Study on dynamic trust metric of trusted network based on state and behavior associated by LI Dao-feng, YANG Yi-xian, GU Li-ze, SUN Bin
Published 2010-01-01
Article -
2
ID-based signature without trusted PKG by ZHOU Liang1, LI Da-peng2, YANG Yi-xian1
Published 2008-01-01
Article -
3
Constructing optimized Boolean functions by CHEN Wei1, YANG Yi-xian1, NIU Xin-xin2
Published 2006-01-01
Article -
4
Design of steganography algorithm based on MPEG-4 coding scheme by YUAN Kai-guo, ZHANG Ru, XU Xin, NIU Xin-xin, YANG Yi-xian
Published 2009-01-01
Article -
5
VDSC steganalysis algorithm of echo hiding by YANG Yu1, LEI Min1, NIU Xin-xin1, YANG Yi-xian1
Published 2009-01-01
Article -
6
Model for virtual corporations partner selection based on adaptive genetic algorithm by LI Jian1, JING Bo2, NIU Shao-zhang1, YANG Yi-xian1
Published 2009-01-01
Article -
7
Research on semantics of trust transitivity in cryptographic primitives by WANG Li-cheng1, PAN Yun2, GU Li-ze1, YANG Yi-xian1
Published 2008-01-01
Article -
8
Cryptanalysis of some chaos-based keyed hash functions by ZHENG Shi-hui1, ZHANG Guo-yan3, YANG Yi-xian1, LI Zhong-xian1
Published 2011-01-01
Article -
9
New transferable electronic cash scheme by XU Guo-sheng1, GU Li-ze1, YANG Yi-xian1, LI Zhong-xian1
Published 2008-01-01
Article -
10
Audio steganography by quantization index modulation in the DCT domain by CHEN Ming1, ZHANG Ru1, LIU Fan-fan1, NIU Xin-xin1, YANG Yi-xian1
Published 2009-01-01
Article -
11
Image quality evaluation method base on digital wavelet transform and vision weighted by JIANG Ming1, MA Zhao-feng1, XIN Yu3, NIU Xin-xin1, YANG Yi-xian1
Published 2011-01-01
Article -
12
ID-based transitive signature schemes without random oracle by MA Xiao-long1, GU Li-ze1, CUI Wei4, YANG Yi-xian1, HU Zheng-ming1
Published 2010-01-01
Article -
13
Motion state-based data delivery scheme of delay tolerant mobile sensor networks by YANG Kui-wu1, ZHENG Kang-feng1, YANG Yi-xian1, GUO Shi-ze1, WU Bin1
Published 2010-01-01
Article -
14
Trusted digital rights management protocol supporting for time and space constraint by MA Zhao-feng1, FAN Ke-feng2, CHEN Ming1, YANG Yi-xian1, NIU Xin-xin1
Published 2008-01-01
Article -
15
Some results about negabent functions by REN Chuan-lun1, LIU Feng-mei4, LI Zhong-xian1, NIU Xin-xin1, YANG Yi-xian1
Published 2011-01-01
Article -
16
Analysis and improvement of the CS-based fair exchange protocol by SUN Yan-bin1, GU Li-ze1, SUN Yan3, QING Si-han4, YANG Yi-xian1, CHEN Guang-hui1
Published 2010-01-01
Article -
17