-
2861
-
2862
Effect of cold-rolling cladding on microstructure and properties of composite aluminum alloy foil
Published 2013-09-01“…Tongxin xuebao…”
Get full text
Article -
2863
-
2864
Research on semantics of trust transitivity in cryptographic primitives
Published 2008-01-01“…Tongxin xuebao…”
Get full text
Article -
2865
-
2866
Review on 5G-satellite integrated network
Published 2022-04-01“…Tongxin xuebao…”
Get full text
Article -
2867
Friends mechanism-based routing intrusion detection model for mobile ad hoc network
Published 2015-11-01“…Tongxin xuebao…”
Get full text
Article -
2868
Flow-of-traffic prediction program based mobile edge computing for Internet of vehicles using double auction
Published 2020-12-01“…Tongxin xuebao…”
Get full text
Article -
2869
-
2870
-
2871
Colluding clique detector based on activity similarity in P2P trust model
Published 2009-01-01“…Tongxin xuebao…”
Get full text
Article -
2872
-
2873
Trusted and anonymous authentication scheme for wireless networks
Published 2009-01-01“…Tongxin xuebao…”
Get full text
Article -
2874
Dual-proxy key-based threshold signature scheme for ship ad-hoc network
Published 2018-07-01“…Tongxin xuebao…”
Get full text
Article -
2875
-
2876
Overview of the data security and privacy-preserving of mobile cloud services
Published 2013-12-01“…Tongxin xuebao…”
Get full text
Article -
2877
-
2878
Design of steganography algorithm based on MPEG-4 coding scheme
Published 2009-01-01“…Tongxin xuebao…”
Get full text
Article -
2879
High-precision symbol timing algorithm for specific emitter identification
Published 2018-08-01“…Tongxin xuebao…”
Get full text
Article -
2880