Jin Hu
发表
Xu Yang,
Hui-Xiang Xiong,
Jin Hu,
2015,
2015 International Conference on Computer Science and Applications (CSA).
Debiao He,
Jin Hu,
Jianhua Chen,
2010,
IACR Cryptol. ePrint Arch..
Jianhua Chen,
Debiao He,
Jin Hu,
2010,
IACR Cryptol. ePrint Arch..
Debiao He,
Jianhua Chen,
Jin Hu,
2010,
IACR Cryptol. ePrint Arch..
Jianhua Chen,
Debiao He,
Jin Hu,
2012,
Inf. Fusion.
Jianhua Chen,
Debiao He,
Jin Hu,
2010,
Informatica.
Jianhua Chen,
Debiao He,
Jin Hu,
2010,
IACR Cryptol. ePrint Arch..
Jianhua Chen,
Debiao He,
Jin Hu,
2011,
Int. J. Comput. Commun. Control.
Jianhua Chen,
Debiao He,
Jin Hu,
2011,
Int. J. Netw. Secur..
Jin Hu,
2006
.
Jianhua Chen,
Debiao He,
Jin Hu,
2010,
IACR Cryptol. ePrint Arch..
Debiao He,
Jin Hu,
D. He,
2011,
IACR Cryptol. ePrint Arch..
Jianhua Chen,
Debiao He,
Jin Hu,
2010,
IACR Cryptol. ePrint Arch..
Jun Wang,
Jin Hu,
2015,
Neural Networks.
Jianhua Chen,
Debiao He,
Jin Hu,
2010,
IACR Cryptol. ePrint Arch..
Debiao He,
Jianhua Chen,
Jin Hu,
2012
.
Nikola Kasabov,
Zeng-Guang Hou,
Liang Peng,
2015,
The 27th Chinese Control and Decision Conference (2015 CCDC).
Jianhua Chen,
Debiao He,
Jianhua Chen,
2011,
Ann. des Télécommunications.
Dashun Que,
Bi Chen,
Jin Hu,
2008,
2008 9th International Conference on Signal Processing.
Feng Zhang,
Zengguang Hou,
Jin Hu,
2013,
Proceedings of the 32nd Chinese Control Conference.
Jin Hu,
2011
.
Jin Hu,
Xiang-Yang Lu,
2011
.
Liang Hu,
Jin Hu,
Cheng Zhong Huang,
2013
.
Weakness Analysis and Improvement of a Gateway-Oriented Password-Based Authenticated Key Exchange Protocol
pdf
Jianhua Chen,
Debiao He,
Jin Hu,
2010,
ArXiv.