×
验证码:
换一张
Forgotten Password?
Stay signed in
Login With UMPASS
English
|
繁體
Login With UMPASS
Log In
ALL
ORCID
TI
AU
PY
SU
KW
TY
JN
DA
IN
PB
FP
ST
SM
Study Hall
Image search
Paste the image URL
Home
Faculties & Institutes
Scholars
Publications
Subjects
Statistics
News
Search in the results
Faculties & Institutes
THE STATE KEY LA... [1]
Authors
JIA WEI JIA [1]
Document Type
Journal article [6]
Date Issued
2020 [1]
2018 [1]
2013 [1]
2012 [1]
2005 [2]
Language
英語English [4]
中文Chinese [2]
Source Publication
Jisuanji Yanjiu ... [6]
Indexed By
Funding Organization
Funding Project
×
Knowledge Map
UM
Start a Submission
Submissions
Unclaimed
Claimed
Attach Fulltext
Bookmarks
Browse/Search Results:
1-6 of 6
Help
Selected(
0
)
Clear
Items/Page:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
Sort:
Select
Issue Date Ascending
Issue Date Descending
Title Ascending
Title Descending
Author Ascending
Author Descending
WOS Cited Times Ascending
WOS Cited Times Descending
Submit date Ascending
Submit date Descending
Journal Impact Factor Ascending
Journal Impact Factor Descending
A Low-Coupling Method in Sensor-Cloud Systems Based on Edge Computing
Journal article
Liang, Yuzhu, Mei, Yaxin, Yang, Yi, Ma, Ying, Jia, Weijia, Wang, Tian. A Low-Coupling Method in Sensor-Cloud Systems Based on Edge Computing[J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2020, 57(3), 639-648.
Authors:
Liang, Yuzhu
;
Mei, Yaxin
;
Yang, Yi
;
Ma, Ying
;
Jia, Weijia
; et al.
Favorite
|
TC[Scopus]:
6
|
Submit date:2021/12/06
Edge Computing
Internet Of Things
Kuhn-munkres Algorithm
Low-coupling
Sensor-cloud
A RFID Anonymous Grouping Proof Protocol Using Dual-Layer Verification 一种采用双层校验的RFID离线匿名群证明协议
Journal article
Zhou Z., Wang G., Liu Q., Jia W.. A RFID Anonymous Grouping Proof Protocol Using Dual-Layer Verification 一种采用双层校验的RFID离线匿名群证明协议[J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2018, 55(12), 2674-2684.
Authors:
Zhou Z.
;
Wang G.
;
Liu Q.
;
Jia W.
Favorite
|
TC[Scopus]:
0
|
Submit date:2019/04/04
Anonymous
Elliptic Curve Cryptography
Grouping-proof
Privacy
Rfid Security
Identity-based group proxy signature scheme in the standard model
Journal article
Gu K., Jia W., Li C., Chen R.. Identity-based group proxy signature scheme in the standard model[J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2013, 50(7), 1370-1386.
Authors:
Gu K.
;
Jia W.
;
Li C.
;
Chen R.
Favorite
|
|
Submit date:2019/02/11
CDH problem
Group proxy signature
Identity
Provable security
Security model
A group proxy signature scheme based on sub-secret evolution
Journal article
Gu K., Jia W., Jiang C.. A group proxy signature scheme based on sub-secret evolution[J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2012, 49(5), 962-973.
Authors:
Gu K.
;
Jia W.
;
Jiang C.
Favorite
|
|
Submit date:2019/02/11
CDHP
Cellular automata
Provable security
Proxy signature
Sub-secret evolution
Texture synthesis by the border image
Journal article
Yang G., Wang W., Wu E.. Texture synthesis by the border image[J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2005, 42(12), 2118-2125.
Authors:
Yang G.
;
Wang W.
;
Wu E.
Favorite
|
TC[Scopus]:
4
|
Submit date:2019/02/13
Border Structure
Texel-style Texture
Texture Synthesis
Formal verification techniques in workflow process modeling
Journal article
Zhou J., Shi M., Ye X.. Formal verification techniques in workflow process modeling[J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2005, 42(1), 1-9.
Authors:
Zhou J.
;
Shi M.
;
Ye X.
Favorite
|
TC[Scopus]:
11
|
Submit date:2018/12/22
Petri Net
Process Modeling
Reduction
Soundness
Verification
Workflow