Journal of Guangdong University of Technology ›› 2014, Vol. 31 ›› Issue (3): 67-71.doi: 10.3969/j.issn.10077162.2014.03.012
• Comprehensive Studies • Previous Articles Next Articles
Zhao Guang-qiang, Ling Jie
[1] | Nie Min-hang, Ou Yu-yi. A Digital Currency Decentralized Obfuscation Scheme with Customizable Amounts [J]. Journal of Guangdong University of Technology, 2021, 38(01): 64-68. |
[2] | WANG Yong, JIN Wen-Ting, WANG Ying. A Data Distribution Method for Workflow in Cloud Environment [J]. Journal of Guangdong University of Technology, 2016, 33(04): 23-29. |
[3] | LIU Zhu-Song, CHEN Jie, TIAN Long. Task Scheduling Algorithm Based on Improved Cuckoo Search Algorithm in Cloud Computing Environment [J]. Journal of Guangdong University of Technology, 2016, 33(03): 32-36. |
[4] | WANG Shuang-Tu, HAN Jian-Hua, LUO Jun. Research on Intrusion Prevention Based on Trust in Cloud Environments [J]. Journal of Guangdong University of Technology, 2014, 31(3): 55-61. |
[5] | LIN Xin-Da, LIN Sui. Design of CAE Software Integrated System Based on Integration of Cloud Computing and Super Computing [J]. Journal of Guangdong University of Technology, 2014, 31(3): 72-76. |
[6] | ZHANG Hao-Rong, CHEN Ping-Hua, XIONG Jian-Bin. Task Scheduling Algorithm Based on Simulated Annealing Ant Colony Algorithm in Cloud Computing Environment [J]. Journal of Guangdong University of Technology, 2014, 31(3): 77-82. |
[7] | GAO Chong-zhi1,CAO Jia-li2 . Online/Offline Signature Based on Bilinear Pairings [J]. Journal of Guangdong University of Technology, 2007, 24(4): 63-66. |
|