UM

Browse/Search Results:  1-6 of 6 Help

Selected(0)Clear Items/Page:    Sort:
A Low-Coupling Method in Sensor-Cloud Systems Based on Edge Computing Journal article
Liang, Yuzhu, Mei, Yaxin, Yang, Yi, Ma, Ying, Jia, Weijia, Wang, Tian. A Low-Coupling Method in Sensor-Cloud Systems Based on Edge Computing[J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2020, 57(3), 639-648.
Authors:  Liang, Yuzhu;  Mei, Yaxin;  Yang, Yi;  Ma, Ying;  Jia, Weijia; et al.
Favorite | TC[Scopus]:6 | Submit date:2021/12/06
Edge Computing  Internet Of Things  Kuhn-munkres Algorithm  Low-coupling  Sensor-cloud  
A RFID Anonymous Grouping Proof Protocol Using Dual-Layer Verification 一种采用双层校验的RFID离线匿名群证明协议 Journal article
Zhou Z., Wang G., Liu Q., Jia W.. A RFID Anonymous Grouping Proof Protocol Using Dual-Layer Verification 一种采用双层校验的RFID离线匿名群证明协议[J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2018, 55(12), 2674-2684.
Authors:  Zhou Z.;  Wang G.;  Liu Q.;  Jia W.
Favorite | TC[Scopus]:0 | Submit date:2019/04/04
Anonymous  Elliptic Curve Cryptography  Grouping-proof  Privacy  Rfid Security  
Identity-based group proxy signature scheme in the standard model Journal article
Gu K., Jia W., Li C., Chen R.. Identity-based group proxy signature scheme in the standard model[J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2013, 50(7), 1370-1386.
Authors:  Gu K.;  Jia W.;  Li C.;  Chen R.
Favorite |  | Submit date:2019/02/11
CDH problem  Group proxy signature  Identity  Provable security  Security model  
A group proxy signature scheme based on sub-secret evolution Journal article
Gu K., Jia W., Jiang C.. A group proxy signature scheme based on sub-secret evolution[J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2012, 49(5), 962-973.
Authors:  Gu K.;  Jia W.;  Jiang C.
Favorite |  | Submit date:2019/02/11
CDHP  Cellular automata  Provable security  Proxy signature  Sub-secret evolution  
Texture synthesis by the border image Journal article
Yang G., Wang W., Wu E.. Texture synthesis by the border image[J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2005, 42(12), 2118-2125.
Authors:  Yang G.;  Wang W.;  Wu E.
Favorite | TC[Scopus]:4 | Submit date:2019/02/13
Border Structure  Texel-style Texture  Texture Synthesis  
Formal verification techniques in workflow process modeling Journal article
Zhou J., Shi M., Ye X.. Formal verification techniques in workflow process modeling[J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2005, 42(1), 1-9.
Authors:  Zhou J.;  Shi M.;  Ye X.
Favorite | TC[Scopus]:11 | Submit date:2018/12/22
Petri Net  Process Modeling  Reduction  Soundness  Verification  Workflow