Jinan University

Results: 30



#Item
1

How to Break MD5 and Other Hash Functions Xiaoyun Wang and Hongbo Yu Shandong University, Jinan, China, , Abstract. MD5 is one of the most widely used cryptographic hash funct

Add to Reading List

Source URL: merlot.usc.edu

Language: English - Date: 2005-11-09 16:49:02
    2

    The Matrix Approach for Abstract Argumentation Frameworks Yuming Xu1 and Claudette Cayrol2 1 School of Mathematics, Shandong University, Jinan, China

    Add to Reading List

    Source URL: homepages.abdn.ac.uk

    Language: English - Date: 2015-06-18 05:47:27
      3Jinan / Shandong / Qingdao University / Qingdao

      Florida International University Articulation Agreements Signature Date Unit Institution

      Add to Reading List

      Source URL: apa.fiu.edu

      Language: English - Date: 2013-06-20 14:02:46
      4

      Application of the LBS and GIS Integration in tourism - a case study with Chinese perspectives Mu Zhang, Yang Yang, Yinchun Lyu (Shenzhen Tourism College of Jinan University, 518053, China) Abstract

      Add to Reading List

      Source URL: 3ws1wk1wkqsk36zmd6ocne81.wpengine.netdna-cdn.com

      Language: English - Date: 2013-03-07 22:03:08
        5

        Application of the LBS and GIS Integration in tourism - a case study with Chinese perspectives Mu Zhang, Yang Yang, Yinchun Lyu (Shenzhen Tourism College of Jinan University, 518053, China) Abstract

        Add to Reading List

        Source URL: 3ws1wk1wkqsk36zmd6ocne81.wpengine.netdna-cdn.com

        Language: English - Date: 2013-03-07 22:04:18
          6

          Non-Integer Expansion Embedding for Prediction-Based Reversible Watermarking Shijun xiang School of Information Science and Technology, Jinan University, Guangzhou, China. Email:

          Add to Reading List

          Source URL: www.ihconference.org

          Language: English - Date: 2012-06-02 22:24:54
            7

            How to Break MD5 and Other Hash Functions Xiaoyun Wang and Hongbo Yu Shandong University, Jinan, China, , Abstract. MD5 is one of the most widely used cryptographic hash funct

            Add to Reading List

            Source URL: s3-eu-west-1.amazonaws.com

            Language: English - Date: 2014-12-18 11:32:43
              8

              Babbitt in China Chinese Reactions to Babbitt: Admiration, Encumbrance, Vilification Zhu Shoutong Jinan University

              Add to Reading List

              Source URL: www.nhinet.org

              Language: English - Date: 2005-08-04 17:42:11
                9Biology / Dinoflagellates / Aquatic ecology / Biological oceanography / Algal bloom / Red tide / Dinophysis / Yellow Sea / Noctiluca scintillans / Water / Fisheries / Bohai Sea

                Summary of National Report on HABs in China Songhui Lu1 and Zhou Mingjiang2 1 Department of Environmental Engineering, Jinan University, Guangzhou, CHINA

                Add to Reading List

                Source URL: www.cearac-project.org

                Language: English - Date: 2006-01-31 10:00:00
                10Oak Ridge Associated Universities / Jinan / Conflict of interest / Contract / University of Michigan / Academia / Politics / Association of Public and Land-Grant Universities / Law / North Central Association of Colleges and Schools

                THE UNIVERSITY OF MICHIGAN REGENTS COMMUNICATION Approved  b y  the  Regents May  1 9,  2 011

                Add to Reading List

                Source URL: www.regents.umich.edu

                Language: English - Date: 2012-01-05 14:16:09
                UPDATE