[1] |
ZHANG Xiaoping, LIN Meihan.
Comparison between two air quality index systems in study of urban air pollution in China and its socio-economic determinants
[J]. , 2020, 37(1): 39-50.
|
[2] |
BAI Caiquan, WEN Zhenyin, SONG Weixuan, SONG Yifan.
Spatial effect of the new-type urbanization of Poyang lake ecological economic region
[J]. , 2015, 32(6): 760-768.
|
[3] |
ZHANG Lei, SHANG Yali, SUN Bo.
A meet-in-the-middle attack on Lblock
[J]. , 2014, 31(4): 564-569.
|
[4] |
LI Zhao, WANG Yue-Wu, LEI Ling-Guang, ZHANG Zhong-Wen.
Android SMS encryption scheme based on dynamic key
[J]. , 2013, 30(2): 272-277.
|
[5] |
LI Ling, LI Jing, XU Lin, WANG Wei-Wei.
Privacy protection of user identities in cloud computing
[J]. , 2013, 30(1): 98-105.
|
[6] |
SHEN Zhen-Ya, XIAO Jun, WANG Ying, SUI Hong-Jian.
Study on the geometrical identification method of blocks in fractured rock masses
[J]. , 2012, 29(1): 81-87.
|
[7] |
ZHAO Yong-Bin, FAN Tong-Rang.
Simple proof of bit security for NTRU
[J]. , 2011, 28(6): 832-836.
|
[8] |
YANG Hui-Hui, ZHAO Xian-Feng.
A modified method for storage and revoking of the AACS device keys
[J]. , 2011, 28(5): 642-647.
|
[9] |
CUI Ming-Lu, WANG Zhi-Qiang, LIU Wei.
A simulation platform for satellite-to-ground quantum key communication
[J]. , 2011, 28(2): 241-245.
|
[10] |
ZHANG Lei, GUO Jian-Sheng.
Best impossible differential cryptanalysis of 6-round ARIA
[J]. , 2011, 28(2): 266-273.
|
[11] |
PAN Jia-Xin, MA Chang-She, WANG Li-Bin.
Efficient and semantically secure password-based group key exchange protocol
[J]. , 2010, 27(4): 547-555.
|
[12] |
ZHANG Hai-Bin, WU Chuan-Kun, WEI Ling-Bo.
Key privacy in multi-recipient setting and shortened private broadcast encryption
[J]. , 2010, 27(1): 90-106.
|
[13] |
ZHAO Chao, HONG Hua-Sheng, ZHU Mu-Lan.
A three-stepwise robust statistical method for outlying rainfall observation
[J]. , 2010, 27(1): 17-26.
|
[14] |
WU Jing-Jing, JING Ji-Wu, WANG Yue-Wu, LIN Jing-Qiang, Liu Yi-Cong.
Trust model for Public Key Infrastructure in the real-world environment
[J]. , 2009, 26(3): 389-399.
|
[15] |
Xu Jing.
Security analysis of a key agreement protocol for mobile Ad Hoc network
[J]. , 2008, 25(5): 611-614.
|