[1] |
WANG Yu,NING Kexin,ZHU Leilei .
Security API for Remote Relief System Based on TLS and JWT
[J]. Journal of Jilin University(Information Science Ed, 2017, 35(6): 656-661.
|
[2] |
LI Wei, YANG Zhongming.
Review of Intrusion Detection System
[J]. Journal of Jilin University(Information Science Ed, 2016, 34(5): 657-662.
|
[3] |
LIU Enfen, YUAN Liang, ZHANG Yuhai.
Design of Intelligent Vehicle‘’s Electronic Vacuum Booster
[J]. Journal of Jilin University(Information Science Ed, 2016, 34(4): 484-490.
|
[4] |
GUO Dong, LI Qiang, LIU Jian, WEI Xiaohui.
Construction of Android Based Experimental Platform for Mobile Application Security
[J]. Journal of Jilin University(Information Science Ed, 2015, 33(3): 325-330.
|
[5] |
QIAN Chenghui, QI Zhenwei, ZHANG Nan, ZHANG Xingyu, LIU Hongshi.
Smart Security Patrol Car Based on Multi-Sensor Detection
[J]. Journal of Jilin University(Information Science Ed, 2014, 32(4): 401-406.
|
[6] |
HOU Kun, YU Xiaopeng.
Research on Security Mechanism in Database as a Service Mode
[J]. Journal of Jilin University(Information Science Ed, 2014, 32(4): 413-417.
|
[7] |
WANG Lin-song, LIU De-shan, GUO Jin, WANG Hong-dong.
Design of Public Cloud Security Architecture
[J]. J4, 2013, 31(2): 165-169.
|
[8] |
TAO Yue, TIAN Ying-hua.
Application of Multilevel Extension Assessment Method in Network Security Evaluation
[J]. J4, 2013, 31(1): 95-100.
|
[9] |
KANG Li, YANG Cheng.
Improvement on PS Identity Based Signature Scheme
[J]. J4, 2012, 30(2): 120-126.
|
[10] |
DONG Yan-Hua, LI Xiao-Jia, ZHANG Ye.
Research on Security Telecommunication of MPICH Parallel Computing System
[J]. J4, 2011, 29(5): 481-483.
|
[11] |
SONG He-ping,HU Cheng-quan,FAN Dong-xia,HE Li-li,CAO Ying-hui.
Cluster-Based Key Management Scheme for Wireless Sensor Networks
[J]. J4, 2011, 29(03): 231-.
|
[12] |
ZHANG Ya-bin.
Research and Implementation of E-Government System Based on J2EE and XML
[J]. J4, 2010, 28(06): 643-.
|
[13] |
LIU Jing|ZHU Xiao-dong|LI Da-wei.
Fragile Watermarking Scheme Used in Content Features Complete Authentication
[J]. J4, 2010, 28(04): 419-.
|
[14] |
LIU Jing|CHENG Chao|LI Da-wei.
Exchange Protocol and Implementation of Using Biometric Watermark
[J]. J4, 2010, 28(03): 303-.
|
[15] |
SUN Bing,LIU Wen,TIAN Di, SONG Tong|FU Yan.
Application of Time Series Data Mining on Security Analysis
[J]. J4, 2010, 28(03): 270-.
|