Author of the publication

Research on Security Assessment of Cross Border Data Flow.

, , , , and . FCS, volume 1558 of Communications in Computer and Information Science, page 327-341. Springer, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Some classes of monomial complete permutation polynomials over finite fields of characteristic two., , , and . Finite Fields Their Appl., (2014)Research on Security Assessment of Cross Border Data Flow., , , , and . FCS, volume 1558 of Communications in Computer and Information Science, page 327-341. Springer, (2021)Several classes of optimal p-ary cyclic codes with minimum distance four., , and . Finite Fields Their Appl., (December 2023)Detecting Inconsistent Vulnerable Software Version in Security Vulnerability Reports., , , , , , , , and . FCS, volume 1558 of Communications in Computer and Information Science, page 78-99. Springer, (2021)New near-complementary sequences with low PMEPR for peak power control in OFDM., and . IWSDA, page 96-99. IEEE, (2011)Several Classes of Permutation Trinomials over F5sn From Niho Exponents., and . CoRR, (2017)Several new classes of optimal ternary cyclic codes with two or three zeros., , , and . CoRR, (2024)Cross-Border Data Security from the Perspective of Risk Assessment., , , , , , and . ISPEC, volume 14341 of Lecture Notes in Computer Science, page 91-104. Springer, (2023)Construction of Near-Complementary Sequences with Low PMEPR for Peak Power Control in OFDM., , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 95-A (11): 1881-1887 (2012)Construction of near-complementary sequences of length n · 2m., and . IWSDA, page 19-23. IEEE, (2015)