[1] |
QU Xueqing, ZHANG Shengchang.
Finer-grained taint analysis method based on reverse computing
[J]. Journal of Hebei University (Natural Science Edition), 2019, 39(4): 437-443.
|
[2] |
QI Xiaona,WANG Jia, XU Dongsheng, ZHANG Yujing,GUO Jia,LIU Yang.
Application of improved k-means differential privacy protection in location privacy protection
[J]. Journal of Hebei University (Natural Science Edition), 2018, 38(3): 315-320.
|
[3] |
DU Ruizhong,ZHAO Fanghua.
Multi-center encryption scheme for weight attributes of ciphertext policy in cloud computing environment
[J]. Journal of Hebei University (Natural Science Edition), 2017, 37(5): 531-536.
|
[4] |
LI Haiying,ZHANG Jiangxiao,SUI Chunrong.
Fair outsourcing computations scheme based on transferability
[J]. Journal of Hebei University (Natural Science Edition), 2017, 37(5): 555-560.
|
[5] |
LIU Zhenpeng,MAN Zhixian,HU Qianru,LIU Xiaodan.
Improved identity-based data integrity verification scheme
[J]. Journal of Hebei University (Natural Science Edition), 2017, 37(1): 86-91.
|
[6] |
WANG Yuxi, ZHOU Wenjun,YANG Jian.
Analysis and Research on Malicious Code for Client
[J]. Journal of Hebei University (Natural Science Edition), 2015, 35(2): 193-198.
|
[7] |
QI Yaolong,LIU Huijun,DENG Na.
An intrusion tolerance model of database security based on autonomic computing
[J]. Journal of Hebei University (Natural Science Edition), 2014, 34(3): 312-316.
|
[8] |
LI Wei-xian.
Establishment and Analysis of Open Digital Works Transmitting System
[J]. Journal of Hebei University (Natural Science Edition), 2011, 31(3): 319-324.
|
[9] |
RONG Cheng-lin.
Application of Logistic Map in Improving Security of DES Algorithm
[J]. Journal of Hebei University (Natural Science Edition), 2011, 31(2): 218-224.
|
[10] |
GAO Li-min,LI Jun,YU Hui-ping,XIAO Yan-qin.
Research of Resource Sharing Model and Access Mechanism Based on TPM
[J]. Journal of Hebei University (Natural Science Edition), 2010, 30(4): 445-448.
|
[11] |
LI Wei-xian,BAI Xiao-yu.
Probabilistic Algorithm of Textual Digital Watermarking and Reliability
[J]. Journal of Hebei University (Natural Science Edition), 2010, 30(3): 327-332.
|
[12] |
LIU Zhenpeng, ZHANG Qingwen, LI Zeyuan, LIU Jiahang, DONG Shuhui, ZHAO Yonggang.
DDoS attack detection model based on Bayesian ARTMAP in software-defined networks
[J]. Journal of Hebei University(Natural Science Edition), 2021, 41(6): 728-733.
|