New construction of secure range query on encrypted data in cloud computing
WANG Shao-hui;HAN Zhi-jie;CHEN Dan-wei;WANG Ru-chuan;College of Computer;Nanjing University of Posts and Telecommunications;Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks;Network and Data Security Key Laboratory of Sichuan Province;School of Computer and Information Engineering;Henan University;
..............page:33-41
Measuring and analyzing node families in the Tor anonymous communication network
WANG Xiao;FANG Bin-xing;LIU Pei-peng;GUO Li;SHI Jin-qiao;Institute of Computing Technology;Chinese Academy of Sciences;Institute of Information Engineering;Chinese Academy of Sciences;Graduated University of Chinese Academy of Sciences;Chinese National Engineering Laboratory for Information Security Technologies;National Computer Network Emergency Response Technical Team/Coordination Center;
..............page:84-91
..............page:92-101
..............page:102-109
..............page:110-120
..............page:121-129
..............page:130-140
..............page:141-147
..............page:148-161
..............page:162-171
..............page:172-178
..............page:179-189
Mergeable adaptive tile coding method
SHI Meng-yu;LIU Quan;FU Qi-ming;School of Computer Science and Technology;Soochow University;Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education;Jilin University;
..............page:190-196
..............page:197-203
..............page:204-207
..............page:208-215
..............page:216-224
..............page:225-233