-
3161
Fuzzy trust model for wireless sensor networks with intrusion tolerance
Published 2010-01-01“…Tongxin xuebao…”
Get full text
Article -
3162
-
3163
Method for trust analysis of exchange process behavior based on noninterference
Published 2014-12-01“…Tongxin xuebao…”
Get full text
Article -
3164
-
3165
-
3166
Research on linearization modeling technology based on large-signal scattering function
Published 2008-01-01“…Tongxin xuebao…”
Get full text
Article -
3167
Survey of data possession provability proving on cloud storage
Published 2012-11-01“…Tongxin xuebao…”
Get full text
Article -
3168
No-feedback rate control algorithm for Wyner-Ziv video coding
Published 2011-01-01“…Tongxin xuebao…”
Get full text
Article -
3169
-
3170
Study of spectrum sharing in integrated satellite-terrestrial system based on space-based interference cartography
Published 2024-03-01“…Tongxin xuebao…”
Get full text
Article -
3171
High-speed hardware architecture design and implementation of Ed25519 signature verification algorithm
Published 2022-03-01“…Tongxin xuebao…”
Get full text
Article -
3172
Reliable heuristic mapping method for survivable virtual network
Published 2015-07-01“…Tongxin xuebao…”
Get full text
Article -
3173
Research and implementation of one-hop transmission framework in wireless network based on network coding
Published 2010-01-01“…Tongxin xuebao…”
Get full text
Article -
3174
-
3175
Novel method based on fractional lower-order correntropy-analogous statistics for parameter jointly estimation in bistatic MIMO radar
Published 2016-12-01“…Tongxin xuebao…”
Get full text
Article -
3176
-
3177
-
3178
-
3179
-
3180
Progress in research on active network flow watermark
Published 2014-07-01“…Tongxin xuebao…”
Get full text
Article