![]() |
| 2007 | ||
|---|---|---|
| 2 | EE | Jihong Li, Yijun Song, Kaihua Wang: Web User's Access Path Clustering. ICNSC 2007: 111-114 |
| 1999 | ||
| 1 | Yuqing Zhang, Jihong Li, Guozhen Xiao: An Approach to the Formal Verification of the Two-Party Crypographic Protocols. Operating Systems Review 33(4): 48-51 (1999) | |
| 1 | Yijun Song | [2] |
| 2 | Kaihua Wang | [2] |
| 3 | Guozhen Xiao | [1] |
| 4 | Yuqing Zhang | [1] |