[1] |
YUAN Zhe, SUN Yanjun, CHEN Liang.
ComputerGenerated Image Recognition Algorithm Based onImproved Local Binary Pattern and Gradient Features
[J]. Journal of Jilin University Science Edition, 2019, 57(06): 1437-1441.
|
[2] |
LI Pengchao, ZHOU Kai.
Electronic Data Forensics Method Based on Docker Container
[J]. Journal of Jilin University Science Edition, 2019, 57(06): 1485-1490.
|
[3] |
CAO Jie, SU Jinxuan, ZHAO Yongzhe, QIU Zhiyang.
Nondeterministic Public Key Cryptography and Its Implementation
[J]. Journal of Jilin University Science Edition, 2019, 57(04): 860-868.
|
[4] |
YANG Jian, YANG Chaoyu, LI Huizong.
Image Identification Method Based on TwoDimensional Discrete Wavelet
[J]. Journal of Jilin University Science Edition, 2019, 57(3): 619-626.
|
[5] |
MA Hua, YAN Xuewei, LIU Zhenhua, DONG Enting.
AttributeBased Encryption Scheme Supporting Accountability and User Revocation
[J]. Journal of Jilin University Science Edition, 2018, 56(4): 939-944.
|
[6] |
WANG Daxing, TENG Jikai.
Authentication Scheme Based on Aggregate Signature in VSNs
[J]. Journal of Jilin University Science Edition, 2018, 56(3): 657-662.
|
[7] |
WANG Daxing, TENG Jikai.
Certificateless Parallel Multisignature SchemeBased on Bilinear Pairings
[J]. Journal of Jilin University Science Edition, 2017, 55(06): 1523-1527.
|
[8] |
LI Aiying, ZHOU Qianyu, ZHANG Wenrui, DONG Haojun.
Construction of Probabilistic Multivariate Public KeyCryptography Based on Unordered Sequences
[J]. Journal of Jilin University Science Edition, 2017, 55(06): 1557-1559.
|
[9] |
ZHAO Yongzhe, WEN Chengdong, DONG Haojun.
Probabilistic MPKC Based on Ordered Sequences
[J]. Journal of Jilin University Science Edition, 2017, 55(04): 969-972.
|
[10] |
LIU Wei, YANG Daoping, JIAN Yan.
Secret Sharing Scheme for Big Data Based on Hierarchical Structure
[J]. Journal of Jilin University Science Edition, 2016, 54(04): 827-832.
|
[11] |
WANG Hongjun, LIU Yi, YUAN Weixin.
Visual Double Secret Sharing with Mask Image
[J]. Journal of Jilin University Science Edition, 2015, 53(06): 1251-1256.
|
[12] |
WANG Daxing, TENG Jikai.
Provably Secure Clock Synchronized Aggregate Signature Scheme
[J]. Journal of Jilin University Science Edition, 2015, 53(05): 969-974.
|
[13] |
ZHENG Ying, OUYANG Dantong, HE Lili, BAI Hongtao.
Hash Based to RFID Security Authentication ProtocolWhich Against the Loss of Aynchronization
[J]. Journal of Jilin University Science Edition, 2015, 53(03): 499-504.
|
[14] |
YANG Zhiwei, Nurbol, JIA Xue, HU Liang.
Intrusion Feature Selection Methods Based on ReliefF
[J]. Journal of Jilin University Science Edition, 2015, 53(03): 505-510.
|
[15] |
CUI Yafen, XIE Nannan.
An Intrusion Detection Method Based on Feature Selection
[J]. Journal of Jilin University Science Edition, 2015, 53(01): 112-116.
|