Publications

    2019

    [1] Qi Li, Hongbo Zhu, Jinbo Xiong, Ruo Mo, Zuobin Ying, Huaqun Wang, Fine-grained multi-authority access control in IoT-enabled mHealth, Annals of Telecommunications, 2019, DOI:10.1007/s12243-018-00702-6. (SCI IF=1.168)

    2018

    [1] Jinbo Xiong, Jun Ren, Lei Chen, Zhiqiang Yao*, Mingwei Lin, Dapeng Wu, Ben Niu, Enhancing privacy and availability for data clustering in intelligent electrical service of IoT, IEEE Internet of Things Journal, 2018, DOI:10.1109/JIOT.2018.2842773. (SCI, IF=5.874)

    [2] Jinbo Xiong, Yuanyuan Zhang, Xuan Li, Mingwei Lin, Zhiqiang Yao*, Guangjun Liu, RSE-PoW: A role symmetric encryption PoW scheme with authorized deduplication for multimedia data, Mobile Networks and Applications, 2018, 23(3):650-663. DOI: 10.1007/s11036-017-0975-x. (SCI, IF=3.259, ESI Highly Cited Paper)

    [3] Jinbo Xiong, Rong Ma, Lei Chen, Youliang Tian*, Li Lin, Biao Jin, Achieving incentive, security, and scalable privacy protection in mobile crowdsensing services, Wireless Communications and Mobile Computing, 2018, DOI: 10.1155/2018/8959635. (SCI, IF=0.869, CCF C)

    [4] Ayong Ye*, Jianfei Shao, Li Xu, Jianwei Chen, Jinbo Xiong, A local HMM for indoor positioning based on fingerprinting and displacement ranging, IET Communications, 2018, 12(10):1163-1170. DOI:10.1049/iet-com.2017.1055. (SCI, IF=1.061)

    [5] Biao Jin, Dongshuo Jiang, Jinbo Xiong*, Lei Chen, Qi Li, D2D data privacy protection mechanism based on reliability and homomorphic encryption, IEEE Access, 2018, 6(1):51140-51150, DOI:10.1109/ACCESS.2018.2869575. (SCI, IF=3.557)

    [6] Minshen Wang, Jinbo Xiong*, Rong Ma, Biao Jin, Qi Li, A novel data secure deletion scheme for mobile device, in proc. of the 27th International Conference on Computer Communications and Networks (ICCCN 2018), Hangzhou, China, 2018, 1-8. (CCF C )

    [7] Jinbo Xiong, Minshen Wang, Youliang Tian, Rong Ma, Zhiqiang Yao*, Mingwei Lin, Research progress on privacy measurement for cloud data, Journal of Software, 2018, 29(7):1963-1980.

    [8] Jinbo Xiong, Yuanyuan Zhang, Youliang Tian*, Zuobin Ying, Qi Li, Rong Ma, A cloud data secure deduplication scheme via role-based symmetric encryption, Journal on Communications, 2018,39(5):59-73. (in Chinese with English abstract)

    [9] Jinbo Xiong, Rong Ma, Ben Niu*, Yunchuan Guo, Li Lin, Privacy Protection Incentive Mechanism Based on User-union Matching in Mobile Crowdsensing, Journal of Computer Research and Development, 2018,55(7):1359-1370. (in Chinese with English abstract)

    [10] Minshen Wang, Jinbo Xiong*, Qian Lin, Lili Wang, Cloud data assured deletion scheme based on key distribution and ciphertext sampling, Journal of Computer Applications, 2018, 38(1):194-200.

    [11] Rong Ma, Shengyuan Feng, Jinbo Xiong*, Biao Jin, Lili Wang, Privacy protection method based on security game model, Journal of Wuhan University (Natural Science Edition), 2018,64(2):165-174.

    [12] Qi Li*, Hongbo Zhu, Jinbo Xiong, Ruo Mo, Multi-authority attribute-based access control system in mHealth with traceability, Journal on Communications, 2018,39(6):1-10. (in Chinese with English abstract)

    [13] Rong Ma, Xiuhua Chen, Hui Liu, Jinbo Xiong*, Research on user privacy measurement and privacy protection in mobile crowdsensing, Netinfo Security, 2018,18(8):64-72.

    [14] Li Lin, Xiaofei Liao, Peng Li, Hai Jin, Jinbo Xiong, Distributed and application-aware task scheduling in edge-clouds, in proc. of the International Conference on Mobile Ad-hoc and Sensor Networks (MSN 2018), Shenyang, China, 2018.

    [15] Jinbo Xiong, Xiuhua Chen, Youliang Tian*, Rong Ma, Lei Chen, Zhiqiang Yao, MAIM: a novel incentive mechanism based on multi-attribute user selection in mobile crowdsensing, IEEE Access, 2018, 6(1):65384-65396. DOI: 10.1109/ACCESS.2018.2878761. (SCI, IF=3.557)

    [16] Xuan Li, Jin Li, Siuming Yiu, Chongzhi Gao, Jinbo Xiong, Privacy-preserving edge-assisted image retrieval and classification in IoT, Frontiers of Computer Science, 2018, Accept. (SCI, IF=1.105)

     

    2017

    [1] Jinbo Xiong, Yuanyuan Zhang, Li Lin*, Jian Shen, Xuan Li, Mingwei Lin, ms-PoSW: A multi-server aided proof of shared ownership scheme for secure deduplication in cloud, Concurrency Computat: Pract Exper, 2017, DOI:10.1002/cpe.4252 (SCI, IF=1.133)

    [2] Mingwei Lin, Riqing Chen*, Jinbo Xiong, Xuan Li, Zhiqiang Yao, Efficient sequential data migration scheme considering dying data for HDD/SSD hybrid storage systems, IEEE Access, 2017, 23366-23373, DOI:10.1109/ACCESS.2017.2766667. (SCI, IF=3.244)

    [3] Jinbo Xiong, Suping Li, Yuanyuan Zhang, Xuan Li, Ayong Ye, Zhiqiang Yao*, PoSW: A novel secure deduplicatin scheme for collaborative cloud applications, Journal on Communications, 2017, 38(7):18-27. (in Chinese with English abstract)

    [4] Rong Ma, Jinbo Xiong*, Mingwei Lin, Zhiqiang Yao, Hui Lin, Ayong Ye, Privacy Protection-oriented Mobile Crowdsensing Analysis Based on Game Theory, in proc. of the 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom), Sydney, Australia, 2017, 990-995. (CCF C)

    [5] Yuanyuan Zhang, Jinbo Xiong*, Mingwei Lin, Lili Wang, Xuan Li Achieving Proof of Shared Ownership for the Shared File in Collaborative Cloud Applications, in proc. of the 3rd International Conference on Cloud Computing and Security (IEEE ICCCS), Nanjing, China, 2017, 262-274.

    [6] Huibing Wang, Mingwei Lin*, Jinbo Xiong, Li Lin, Zheyu Chen, Workload-aware Page-level Flash Translation Layer for NAND Flash-based Storage Systems, in proc. of the 3rd International Conference on Cloud Computing and Security (IEEE ICCCS), Nanjing, China, 2017, 576-588.

    [7] Yuanyuan Zhang, Jinbo Xiong*, Jun Ren, Lili Wang, Mingwei Lin, A novel role symmetric encryption algorithm for authorized deduplication in cloud, in proc. of the 10th EAI International Conference on Mobile Multimedia Communications (EAI MOBIMEDIA), Chongqing, China, 2017, 104-110.

    [8] Huibing Wang, Jinbo Xiong, Zhiqiang Yao*, Mingwei Lin, Jun Ren, Research survey on support vector machine, in proc. of the 10th EAI International Conference on Mobile Multimedia Communications (EAI MOBIMEDIA), Chongqing, China, 2017, 95-103.

    [9] Jun Ren, Jinbo Xiong, Zhiqiang Yao*, Rong Ma, Mingwei Lin, DPLK-means: A novel Differential Privacy K-means Mechanism, 2017 IEEE Second International Conference on Data Science in Cyberspace (IEEE DSC), Shenzhen, China, 2017, 133-139.

    [10] Jinbo Xiong*, Rong Ma, Yuanyuan Zhang, Ruiyu Dai, Image information hiding method and implementation for social network, Netinfo Security, 2017(3):6-13. (in Chinese with English abstract)

    [11] Jun Ren, Jinbo Xiong, Zhiqiang Yao*, A security control scheme for cloud data copy based on differential privacy model, Chinese Journal of Network and Information Security, 2017, 3(5):38-46. (in Chinese with English abstract)

     

    2016

    [1] Qi Li*, Jianfeng Ma, Rui Li, Jinbo Xiong, Danwei Chen, Secure, efficient and revocable multi-authority access control system in cloud storage, Computers & Security, 2016, 59(6):45-59.

    [2] Tao Zhang*, Jianfeng Ma, Ning Xi, Ximeng Liu, Jinbo Xiong, Trust based decentralized service composition approach in service oriented mobile social networks, Acta Electronica Sinica, 2016, 44(2):258-267. (in Chinese with English abstract)

    [3] Mingwei Lin, Zhiqiang Yao*, Jinbo Xiong, History-aware page replacement algorithm for NAND flash-based consumer electronics, IEEE Transactions on Consumer Electronics, 2016, 62(1):23-29.

    [4] Weiwei Shen,Jinbo Xiong,Yangqun Huang,Zhiqiang Yao*, Privacy protection scheme design for short message, Computer Sysyems & Applications,2016, 25(4):118-122. (in Chinese with English abstract)

    [5] Weiwei Shen,Jinbo Xiong*,Yangqun Huang,Zhiqiang Yao, An assured deletion scheme for electronic files based on life cycle control, Journal of Chinese Computer Systems, 2016, 37(5):1091-1096. (in Chinese with English abstract)

    [6] Mang Su, Fenghua Li*, Guozhen Shi, Kui Geng, Jinbo Xiong, A user-centric data secure creation scheme in cloud computing, Chinese Journal of Electronics, 2016, 25(4):753-760.

    [7] Fenghua Li, Yanchao Wang, Lihua Yin*, Rongna Xie, Jinbo Xiong, Novel cyberspace-oriented access control model, Journal on Communications, 2016, 37(5): 9-20. (in Chinese with English abstract)

    [8] Jinbo Xiong, Fenghua Li*, Yanchao Wang, Jianfeng Ma, Zhiqiang Yao, Research progress on cloud data assured deletion based on cryptography, Journal on Communications, 2016, 37(8):167-184. (in Chinese with English abstract)

    [9] Dong Wang, Jinbo Xiong*, Xiaoying Zhang, A trust evaluation mechanism for the dht network node in cloud data secure self-destruction system, Journal of Computer Applications, 2016, 36 (10):2715-2722. (in Chinese with English abstract)

    [10] Yuanyuan Zhang, Jinbo Xiong*, Xuan Li, Biao Jin, Suping Li, Xu An Wang, A multi-replica associated deleting scheme in cloud, in proc. of the 10th International Conference on Complex, Intelligent, and Software Intensive Systems (IEEE CISIS), Fukuoka, Japan, 2016, 444-448.

    [11] Cui Zhang, Jinbo Xiong, Qiong Wu*, An efficient CGA algorithm against DoS attack on duplicate address detection process, in proc. of the IEEE Wireless Communications and Networking Conference Workshops (IEEE WCNC), Doha, Qatar, 2016, 471-476.

    [12] Jinbo Xiong, Yuanyuan Zhang, Fenghua Li*, Suping Li, Jun Ren, Zhiqiang Yao, Research progress on secure data deduplication in cloud, Journal on Communications, 2016,37(11):169-180.

    [13] Jinbo Xiong, Suping Li, Xuan Li*, Yuanyuan Zhang, Biao Jin, A secure access and associate deleting scheme for multi-replica in multi-cloud environment, International Journal of High Performance Systems Architecture, 2016, 6(3):143-152.

    [14] Jun Ren, Zhiqiang Yao, Jinbo Xiong*, Yuanyuan Zhang, Ayong Ye, A secure data deduplication scheme based on differential privacy, in proc. of the 22nd IEEE International Conference on Parallel and Distributed Systems (IEEE ICPADS), Wuhan, China, 2016, 1241-1246. (CCF C)

    [15] Shasha Wu, Jinbo Xiong*, Guohua Ye, Zhiqiang Yao, Location privacy protection scheme based on dummy locations in mobile Internet environment, Netinfo Security, 2016,(10):54-59.

     

    2015

    [1] Qi Li, Jianfeng Ma*, Rui Li, Jinbo Xiong, Ximeng Liu, Large universe decentralized key-policy attribute-based encryption, Security and Communication Networks, 2015, 8(3):501-509.

    [2] Ximeng Liu, Hui Zhu, Jianfeng Ma*, Qi Li, Jinbo Xiong, Attribute based multi-signature scheme for wireless communications, Mobile Information Systems, 2015. http://dx.doi.org/10.1155/2015/827320.

    [3] Weiwei Shen, Zhiqiang Yao*, Jinbo Xiong, Ximeng Liu, Secure storage and self-destruction scheme for privacy data in mobile devices, Journal of Computer Applications, 2015, 35(1):77-82. (in Chinese with English abstract)

    [4] Sufen Dai, Zhiqiang Yao*, Jinbo Xiong, Weiwei Shen, A secure-destruction scheme for OOXML document with identity-based encryption, Journal of Fujian Normal University (Natural Science Edition), 2015, 31(1):40-47. (in Chinese with English abstract)

    [5] Qi Li, Jianfeng Ma*, Rui Li, Jinbo Xiong, Ximeng Liu, Provably secure unbounded multi-authority ciphertext-policy attribute-based encryption, Security and Communication Networks, 2015, 8(18):4098-4109.

    [6] Jinbo Xiong, Fenghua Li, Jianfeng Ma, Ximeng Liu, Zhiqiang Yao*, Patrick S. Chen, A full lifecycle privacy protection scheme for sensitive data in cloud computing, Peer-to-Peer Networking and Applications, 2015, 8(6):1025-1037.

    [7] Fangfang Shan, Fenghua Li*, Rongna Xie, Jinbo Xiong, Yanchao Wang, Multidimensional digital media-oriented access control scheme, Journal on Communications, 2015,36(11):52-60. (in Chinese with English abstract)

    [8] Fenghua Li, Yanchao Wang, Rongna Xie, Jinbo Xiong, A novel cyberspace-oriented access control model, Cryptology ePrint Archive, 2015.

    [9] Yanchao Wang, Fenghua Li*, Jinbo Xiong, Ben Niu, Fangfang Shan, Achieving lightweight and secure access control in multi-authority cloud, in proc. of the 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom), Helsinki, Finland, 2015, 459-466. (Best Paper Award)

    [10] Yazhou Xia, Zhiqiang Yao*, Jinbo Xiong, Accss control framework for composite electronic health records in the cloud computing environment, Computer Systems & Applications, 2015,24(2):35-40. (in Chinese with English abstract)

    [11] Jinbo Xiong*, Weiwei Shen, Yangqun Huang, Zhiqiang Yao, Security sharing and associated deleting scheme for multi-replica in cloud, Journal of communication, 2015, 36(Z1):136-140.

     

    2014
    [1] Jinbo Xiong, Zhiqiang Yao, Jianfeng Ma, Fenghua Li, Ximeng Liu, A secure self-destruction scheme with IBE for the Internet content privacy, Chinese Journal of Computers, 2014, 37(1):139-150. (in Chinese with English abstract)
    [2] Jinbo Xiong, Zhiqiang Yao, Jianfeng Ma, Ximeng Liu, Jun Ma, A composite document model and its access control scheme in cloud computing, Journal of Xi'an Jiaotong University, 2014, 48(2):25-31. (in Chinese with English abstract)
    [3] Jinbo Xiong, Zhiqiang Yao, Jianfeng Ma, Fenghua Li, Ximeng Liu, Qi Li, A secure self-destruction scheme for composite documents with attribute based encryption, Acta Electronica Sinica, 2014, 42(2):366-376. (in Chinese with English abstract)
    [4] Ximeng Liu, Jianfeng Ma, Jinbo Xiong, Guangjun Liu, Ciphertext-policy hierarchical attribute-based encryption for fine-grained access control of encryption data, International Journal of Network Security (IJNS), 2014, 16(4):351-357.
    [5] Ximeng Liu, Jianfeng Ma, JinboXiong, Qi Li, Tao Zhang, Hui Zhu, Threshold attribute based encryption with attribute hierarchy for lattices in the standard model, IET information security, 2014, 8(4):217-223.
    [6] Qi Li, Jianfeng Ma, Jinbo Xiong, Ximeng Liu, Jun Ma, An adaptively secure multi-authority ciphertext-policy ABE scheme in prime order groups, Acta Electronica Sinica, 2014, 42(4):696-702. (in Chinese with English abstract)
    [7] Jinbo Xiong, Zhiqiang Yao, Jianfeng Ma, Ximeng Liu, Qi Li, Jun Ma, PRIAM: Privacy preserving identity and access management scheme in cloud, KSII Transactions on Internet and Information Systems, 2014, 8(1):282-304.
    [8] Tao Zhang, Jianfeng Ma, Ning Xi, Ximeng Liu, Zhiquan Liu, Jinbo Xiong, Trustworthy service composition in service-oriented mobile social networks, in proc. of the 22nd IEEE International Conference on Web Services (IEEE ICWS), Alaska, USA, 2014, 684-687.
    [9] Zhiqiang Yao, Jinbo Xiong, Jianfeng Ma, Qi Li, Ximeng Liu, A secure electronic document self-destructing scheme in cloud computing, Journal of Computer Research and Development, 2014, 51(7):1417-1423. (in Chinese with English abstract)

    [10] Jian Lin, Jinbo Xiong, Zhiqiang Yao, Ximeng Liu, Identity traceable attribute-based multi-signature scheme, Journal of Fujian Normal University (Natural Science Edition), 2014, 30(3):34-42. (in Chinese with English abstract)

    [11] Faliang Huang, Jinbo Xiong, Tianqiang Huang, Ximeng Liu, Gender identification of microblog users based on rough set, Journal of Computer Applications, 2014, 34(8):2209-2211. (in Chinese with English abstract)

    [12] Qi Li, Jianfeng Ma, Jinbo Xiong, Ximeng Liu, Attribute-based encryption based access control scheme with constant-size ciphertext in cloud computing, Journal of Jilin University (Engineering and Technology Edition), 2014, 44(3):788-794. (in Chinese with English abstract)

    [13] Ximeng Liu, Jianfeng Ma, Jinbo Xiong, Tuo He, Qi Li, Attribute based sanitizable signature scheme in cloud computing, Journal of Electronics and Information Technology, 2014, 36(7):1749-1754. (in Chinese with English abstract)

    [14] Guangjun Liu, Ximeng Liu, Jinbo Xiong, A lightweight secure network coding scheme against wiretapping, Wuhan University Journal of Natural Sciences, 2014, 19(2): 156-160.

    [15] Ximeng Liu, Hui Zhu, Jianfeng Ma, Qi Li, Jinbo Xiong, Efficient attribute based sequential aggregate signature for wireless sensor networks, International Journal of Sensor Networks (IJSNet), 2014, 16(3):172-184.

    [16] Jinbo Xiong, Ximeng Liu, Zhiqiang Yao, Jianfeng Ma, Qi Li, Kui Geng, Patrick S. Chen, A secure data self-destructing scheme in cloud computing, IEEE Transactions on Cloud Computing, 2014, 2(4):448-458.


    2013
    [1] Jinbo Xiong, Zhiqiang Yao, Jianfeng Ma, Fenghua Li, Qi Li, Action-based multilevel access control for structured document, Journal of Computer Research and Development, 2013, 50(7):1399-1408. (in Chinese with English abstract) (2013 Journal of Computer Research and Development, Most Cited Papers TOP10)
    [2] Jinbo Xiong, Zhiqiang Yao, Biao Jin, Formal modeling for structured document in cloud computing, Journal of computer applications, 2013, 33(5):1267-1270. (in Chinese with English abstract)
    [3] Jinbo Xiong, Zhiqiang Yao, Jianfeng Ma, Ximeng Liu, Qi Li, A secure document self-destruction scheme: An ABE approach, in proc. of the 15th IEEE International Conference on High Performance Computing and Communications (IEEE HPCC), Hangzhou, China, 2013, 59-64.
    [4] Jinbo Xiong, Zhiqiang Yao, Jianfeng Ma, Ximeng Liu, Qi Li, Tao Zhang, PRAM: Privacy preserving access management scheme in cloud services, in proc. of the International Workshop on Security in Cloud Computing (ACM ASIACCS-SCC), Hangzhou, China, 2013, 41-46.
    [5] Jinbo Xiong, Zhiqiang Yao, Jianfeng Ma, Ximeng Liu, Qi Li, A secure document self-destruction scheme with identity based encryption, in proc. of the 5th IEEE International Conference on Intelligent Networking and Collaborative Systems (IEEE INCoS), Xian, China, 2013, 239-243.
    [6] Jinbo Xiong, Zhiqiang Yao, Jun Ma, Ximeng Liu, Qi Li, Structured document model and its secure access control in cloud computing, in proc. of the 2013 International Conference on Cloud Computing and Big Data (CloudCom-Asia), Fuzhou, China, 2013, 592-596.
    [7] Yao Zhiqiang, Jinbo Xiong, Jianfeng Ma, Qi Li, Ximeng Liu, Community field-centric trust-based access control model, Journal on Communications, 2013, 34(9):1-9. (in Chinese with English abstract)
    [8] Zhiqiang Yao, Jinbo Xiong, Jianfeng Ma, Qi Li, Ximeng Liu, Access control requirements for structured document in cloud computing, International Journal of Grid and Utility Computing (IJGUC), 2013, 4(2/3): 95-102.
    [9] Ximeng Liu, Jianfeng Ma, Jinbo Xiong, Qi Li, Tao Zhang, Ciphertext policy weighted attribute based encryption scheme, Journal of Xi'an Jiaotong University, 2013, 47(8):44-48. (in Chinese with English abstract)
    [10] Ximeng Liu, Jianfeng Ma, Qi Li, Jinbo Xiong, Faliang Huang. Attribute based multi-signature scheme in the standard model, in proc. of the 9th International Conference on Computational Intelligence and Security (IEEE CIS), Leshan, China, 2013, 738-742.
    [11] Ximeng Liu, Jianfeng Ma, Jinbo Xiong, Tao Zhang, Qi Li, Personal health records integrity verification using attribute based proxy signature in cloud computing, in proc. of the 6th International Conference on Internet and Distributed Computing Systems (IDCS 2013), Hangzhou, China, Springer LNCS 8223, 2013:238-251.
    [12] Ximeng Liu, Jianfeng Ma, Jinbo Xiong, Qi Li, Jun Ma, Ciphertext-policy weighted attribute based encryption for fine-grained access control, in proc. of the 5th IEEE International Conference on Intelligent Networking and Collaborative Systems (IEEE INCoS), Xian, China, 2013, 51-57.
    [13] Qi Li, Jianfeng Ma, Jinbo Xiong, Tao Zhang, Ximeng Liu, Fully secure decentralized key-policy attribute-based encryption, in proc. of the 5th IEEE International Conference on Intelligent Networking and Collaborative Systems (IEEE INCoS), Xian, China, 2013, 220-225.
    [14] Ximeng Liu, Jianfeng Ma, Jinbo Xiong, Jun Ma, Qi Li, Attribute based sanitizable signature scheme, Journal on Communications, 2013, (Z1): 148-155. (in Chinese with English abstract)
    [15] Ximeng Liu, Jianfeng Ma, Jinbo Xiong, Qi Li, Tao Zhang, Hui Zhu, Ciphertext-policy weighted attribute-based encryption scheme in cloud computing, Jounal of Sichuan University (Engineering Science Edition), 2013, 45(6):21-26. (in Chinese with English abstract)
    [16] Ximeng Liu,Guangjun Liu,Jianfeng Ma,Jinbo Xiong, Secure network coding scheme for scalable video streaming, Journal on Communications,2013,(5):184-191. (in Chinese with English abstract)
    [17] Jun Ma, Yuanbo Guo, Jianfeng Ma, Jinbo Xiong, Tao Zhang, A hierarchical access control scheme for perceptual layer of IoT, Journal of Computer Research and Development, 2013, 50(6):1267-1275. (in Chinese with English abstract)
    [18] Ximeng Liu, Jianfeng Ma, Jinbo Xiong, Hongtao Li, Attribute based sequential aggregate signature,in proc. of the 2013 International Conference on Cloud Computing and Big Data (CloudCom-Asia), Fuzhou, China, 2013, 603-609.

    [19] Biao Jin, Jinbo Xiong, Zhiqiang Yao, Ximeng Liu, Identity-based on-the-fly encryption and decryption scheme for controlled documents, Journal of Computer Applications, 2013, 33(11):3235-3238.


    2012
    [1] Jinbo Xiong, Zhiqiang Yao, Jianfeng Ma, Qi Li, Multilevel access control model for video database, Journal on Communications, 2012, 33(8):147-154. (in Chinese with English abstract)

Copyright statement: without my permission to disseminate, the present main page content can't be copied, reproduced or used for any commercial purpose, reprint requests with the owner's consent, accompanied by Home link.
Copyright © Jinbo Xiong 2013-2019