School of Computer Science & Technology of Huazhong University of Science and Technology, Wuhan 430074, P. R. China
Online:2010-12-25
Published:2020-02-28
About author:Zhou Ke received his doctoral degree from Huazhong University of Science and Technology (HUST). He is now a professor and a doctoral advisor at HUST, mainly engaged in researching information storage technologies. He has published over 50 papers.
Wang Hua received her doctoral degree from Huazhong University of Science and Technology (HUST). She is now a lecturer at HUST, and is engaged in researching network storage and its application, and software engineering.
Li Chunhua received her doctoral degree from Huazhong University of Science and Technology (HUST). She is now an associate professor at HUST, and is mainly engaged in researching data security.
Supported by:
This work was funded by the National High Technology Research and Development Program of China (“863”program) under Grant No. 2009AA01A402.
School of Computer Science & Technology of Huazhong University of Science and Technology, Wuhan 430074, P. R. China
作者简介:Zhou Ke received his doctoral degree from Huazhong University of Science and Technology (HUST). He is now a professor and a doctoral advisor at HUST, mainly engaged in researching information storage technologies. He has published over 50 papers.
Wang Hua received her doctoral degree from Huazhong University of Science and Technology (HUST). She is now a lecturer at HUST, and is engaged in researching network storage and its application, and software engineering.
Li Chunhua received her doctoral degree from Huazhong University of Science and Technology (HUST). She is now an associate professor at HUST, and is mainly engaged in researching data security.
基金资助:
This work was funded by the National High Technology Research and Development Program of China (“863”program) under Grant No. 2009AA01A402.