Ji, Xiaopeng; Xia, Shixiong; Zhang, Fengrong Constructions of orthogonal sets using semi-bent functions. (Chinese. English summary) Zbl 1413.11132 J. Wuhan Univ., Nat. Sci. Ed. 64, No. 2, 175-182 (2018). MSC: 11T71 94A60 PDFBibTeX XMLCite \textit{X. Ji} et al., J. Wuhan Univ., Nat. Sci. Ed. 64, No. 2, 175--182 (2018; Zbl 1413.11132) Full Text: DOI
Ma, Rong; Feng, Shengyuan; Xiong, Jinbo; Jin, Biao; Wang, Lili Privacy protection method based on security game model. (Chinese. English summary) Zbl 1413.68048 J. Wuhan Univ., Nat. Sci. Ed. 64, No. 2, 165-174 (2018). MSC: 68P25 91A80 94A60 PDFBibTeX XMLCite \textit{R. Ma} et al., J. Wuhan Univ., Nat. Sci. Ed. 64, No. 2, 165--174 (2018; Zbl 1413.68048) Full Text: DOI
Li, Zhanli; Liu, Yaru; Chen, Zhenhua; Chen, Lichao Privacy-preserving determination of spatial location-relation in secure multi-party computation. (Chinese. English summary) Zbl 1413.65033 J. Wuhan Univ., Nat. Sci. Ed. 64, No. 2, 155-164 (2018). MSC: 65D18 PDFBibTeX XMLCite \textit{Z. Li} et al., J. Wuhan Univ., Nat. Sci. Ed. 64, No. 2, 155--164 (2018; Zbl 1413.65033) Full Text: DOI
Song, Yong; Cai, Zhiping Normalized method of intrusion detection data based on information theory in big data environment. (Chinese. English summary) Zbl 1413.94029 J. Wuhan Univ., Nat. Sci. Ed. 64, No. 2, 121-126 (2018). MSC: 94A13 94A15 PDFBibTeX XMLCite \textit{Y. Song} and \textit{Z. Cai}, J. Wuhan Univ., Nat. Sci. Ed. 64, No. 2, 121--126 (2018; Zbl 1413.94029) Full Text: DOI