[1] |
PAN Heng, PAN Lei, YAO Zhongyuan, SI Xueming.
A Patient-Controlled Security Access Mechanism for Electronic Health Records
[J]. Journal of Applied Sciences, 2020, 38(1): 127-138.
|
[2] |
ZHAO Xiao, XU Yan-yan, GONG Jia-ying, SONG Fang-zhen.
A Secure Image Retrieval Method Based on Combined Orthogonal Decomposition and BoVW
[J]. Journal of Applied Sciences, 2018, 36(2): 299-308.
|
[3] |
LIU Shuo-wei, HU Yong-jian, LIU Bei-bei, HUA Xiao-qian.
Texture-Based Image Steganography Using Adaptive Pixel Pair Matching
[J]. Journal of Applied Sciences, 2016, 34(5): 515-526.
|
[4] |
YANG Bin, CHEN Xian-yi, HU Wei-feng.
Blind Detection of Image Splicing Based on Shadow Model
[J]. Journal of Applied Sciences, 2016, 34(5): 564-574.
|
[5] |
QIN Wei, XU Jia-ping, LI Tao.
Secrecy Scheme of Two-Way Space Hopping Transmission in Physical Layer
[J]. Journal of Applied Sciences, 2016, 34(3): 263-274.
|
[6] |
WANG Yu, WANG Zhen-xing, MIAO Fu, LIU Hui-sheng, ZHANG Lian-cheng.
Monte Carlo-Based Network Traffic Camouflage
[J]. Journal of Applied Sciences, 2013, 31(4): 361-367.
|
[7] |
PANG Hong-wei, JIN Liang, HUANG Kai-zhi, JI Jiang.
Physical Layer Secrecy of Wideband System by Adding Random Noise Based on Channel’s Weak Characteristics
[J]. Journal of Applied Sciences, 2013, 31(3): 233-238.
|
[8] |
ZHONG Shang-qin1;2, LIU Fu-qiang3, XU Guo-sheng1;2, YANG Yu1;2, YAO Wen-bin1;2.
Finding Key Host of Network through Iterative Matrix
[J]. Journal of Applied Sciences, 2012, 30(4): 374-378.
|
[9] |
CAO Dong1;2, SONG Yao-liang1.
Multi-party Quantum Covert Communication with Entanglement Private-Keys
[J]. Journal of Applied Sciences, 2012, 30(1): 52-58.
|
[10] |
HONG Tao, SONG Mao-zhong, LIU Yu.
Signal Transmitted from Switched Antenna Array with Low Interception Probability for Physical Layer Security
[J]. Journal of Applied Sciences, 2011, 29(4): 368-373.
|
[11] |
YANG Kai, MA Jian-feng, YANG Chao.
Novel Trusted Routing in Wireless Mesh Networks
[J]. Journal of Applied Sciences, 2011, 29(3): 221-227.
|
[12] |
HU Li-li1;2, MIAO Huai-kou1;2, CHEN Sheng-bo1;2, MEI Jia1, GAO Hong-hao1.
Threat-Driven On-The-Fly Verification of Navigation Model for Web Applications
[J]. Journal of Applied Sciences, 2011, 29(1): 83-92.
|
[13] |
HUANG Jie, HUANG Bei, HUANG Qiu-cen.
Dynamic Load Balancing and Stability Analysis for 3G Network Security Management
[J]. Journal of Applied Sciences, 2010, 28(6): 585-591.
|
[14] |
WANG Kun1, WU Meng2, LU Wei-feng3.
A Location-Based Trust Routing for MANET
[J]. Journal of Applied Sciences, 2010, 28(5): 447-456.
|
[15] |
WANG Kun, WU Meng.
Trustworthy Global Reputation Model in Peer-to-Peer Networks
[J]. Journal of Applied Sciences, 2010, 28(3): 237-245.
|