Search results for: Shiguang Ju
Journal of Information Security and Applications > 2016 > 30 > C > 81-93
Lecture Notes in Computer Science > Information Security and Cryptology - ICISC 2005 > System/Network Security > 169-174
Lecture Notes in Computer Science > Content Computing > Session 4: Content Aware Security (I) > 155-160
Lecture Notes in Computer Science > Computational Science and Its Applications – ICCSA 2010 > Workshop on Information Retrieval, Security and Innovative Applications (RSIA 2010) > 296-308
Lecture Notes in Computer Science > Parallel and Distributed Processing and Applications - ISPA 2005 Workshops > Workshop 2: International Workshop on Advanced Storage Technology and Autonomic Distributed Data (ASTD 2005) > 111-119
Lecture Notes in Computer Science > Computational Science and Its Applications – ICCSA 2007 > Workshop on Virtual Reality in Scientific Applications and Learning (VRSAL 7) > 315-324
Lecture Notes in Computer Science > Grid and Cooperative Computing > Session 5: Web Security and Web Services > 1047-1050
Lecture Notes in Computer Science > Grid and Cooperative Computing > Session 5: Web Security and Web Services > 988-991
Lecture Notes in Computer Science > Grid and Cooperative Computing > Session 11: Data Remote Access, Storage, and Sharing > 907-912
Science China Information Sciences > 2012 > 55 > 7 > 1650-1665