UM

Browse/Search Results:  1-7 of 7 Help

Selected(0)Clear Items/Page:    Sort:
Literary translation during the Chinese Cultural Revolution Journal article
Sun, Yifeng. Literary translation during the Chinese Cultural Revolution[J]. Neohelicon, 2023, 50(2), 669-686.
Authors:  Sun, Yifeng
Favorite | TC[WOS]:0 TC[Scopus]:0  IF:0.2/0.2 | Submit date:2024/01/02
Anonymous Translation  Cultural Revolution  Internal Circulation  Private Translation  
Literary Translation during the Chinese Cultural Revolution Journal article
Sun, Y.. Literary Translation during the Chinese Cultural Revolution[J]. Comparative Literature Studies, 2023.
Authors:  Sun, Y.
Favorite |   IF:0.4/0.3 | Submit date:2022/09/01
Cultural Revolution  Anonymous Translation  Internal Circulation  Private Translation  
A RFID Anonymous Grouping Proof Protocol Using Dual-Layer Verification 一种采用双层校验的RFID离线匿名群证明协议 Journal article
Zhou Z., Wang G., Liu Q., Jia W.. A RFID Anonymous Grouping Proof Protocol Using Dual-Layer Verification 一种采用双层校验的RFID离线匿名群证明协议[J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2018, 55(12), 2674-2684.
Authors:  Zhou Z.;  Wang G.;  Liu Q.;  Jia W.
Favorite | TC[Scopus]:0 | Submit date:2019/04/04
Anonymous  Elliptic Curve Cryptography  Grouping-proof  Privacy  Rfid Security  
Anonymous authentication without home server in mobile roaming networks Journal article
Jiang C., Jia W., Gu K., Xu N.. Anonymous authentication without home server in mobile roaming networks[J]. Chinese Journal of Electronics, 2013, 22(2), 382-386.
Authors:  Jiang C.;  Jia W.;  Gu K.;  Xu N.
Favorite |  | Submit date:2019/02/11
Anonymous authentication  Group signature  Key exchange  Mobile roaming networks  
Anonymous authentication based on mobile roaming network Journal article
Jiang C., Jia W., Gu K.. Anonymous authentication based on mobile roaming network[J]. Advanced Science Letters, 2012, 7, 95-97.
Authors:  Jiang C.;  Jia W.;  Gu K.
Favorite | TC[Scopus]:0 | Submit date:2019/02/11
Anonymous Authentication  Group Signature  Roaming Network  Wireless Communication  
Efficient authentication protocol using elliptic curve with user anonymity for heterogeneous wireless networks Journal article
Jiang C., Jia W., Gu K.. Efficient authentication protocol using elliptic curve with user anonymity for heterogeneous wireless networks[J]. Journal of Information and Computational Science, 2012, 9(4), 1055-1061.
Authors:  Jiang C.;  Jia W.;  Gu K.
Favorite |  | Submit date:2019/02/11
Anonymous authentication  Elliptic curve  Group signature  Heterogeneous wireless networks  
The social cost of gambling in Macao: Before and after the liberalisation of the gaming industry Journal article
Fong D.K.C., Fong H.N., Li S.Z.. The social cost of gambling in Macao: Before and after the liberalisation of the gaming industry[J]. International Gambling Studies, 2011, 11(1), 43.
Authors:  Fong D.K.C.;  Fong H.N.;  Li S.Z.
Favorite | TC[WOS]:37 TC[Scopus]:42 | Submit date:2018/10/30
Casino  Casino Games  Dsm-iv  Gamblers Anonymous  Gambling  Gambling Industry