2007 | ||
---|---|---|
2 | EE | Jihong Li, Yijun Song, Kaihua Wang: Web User's Access Path Clustering. ICNSC 2007: 111-114 |
1999 | ||
1 | Yuqing Zhang, Jihong Li, Guozhen Xiao: An Approach to the Formal Verification of the Two-Party Crypographic Protocols. Operating Systems Review 33(4): 48-51 (1999) |
1 | Yijun Song | [2] |
2 | Kaihua Wang | [2] |
3 | Guozhen Xiao | [1] |
4 | Yuqing Zhang | [1] |