-
3261
-
3262
New extension method of trusted certificate chain in virtual platform environment
Published 2018-06-01“…Tongxin xuebao…”
Get full text
Article -
3263
Research of duality and multi-level security model based on intransitive noninterference theory
Published 2009-01-01“…Tongxin xuebao…”
Get full text
Article -
3264
-
3265
-
3266
-
3267
-
3268
-
3269
Research on large-scale P2P worm simulation
Published 2011-01-01“…Tongxin xuebao…”
Get full text
Article -
3270
2<sup>m</sup>p<sup>n</sup>周期二元序列的线性复杂度和k错线性复杂度
Published 2008-01-01“…Tongxin xuebao…”
Get full text
Article -
3271
-
3272
-
3273
Resource allocation mechanism in the TWDM-PON and C-RAN joint architecture with hybrid energy supply
Published 2018-09-01“…Tongxin xuebao…”
Get full text
Article -
3274
-
3275
-
3276
Security mechanism in access control based on non-cooperative game
Published 2014-11-01“…Tongxin xuebao…”
Get full text
Article -
3277
-
3278
Research on certificateless anonymous authentication and key agreement scheme of vehicle network based on CPN
Published 2024-06-01“…Tongxin xuebao…”
Get full text
Article -
3279
-
3280
Novel opportunistic cooperative multicast scheme for NOMA
Published 2020-11-01“…Tongxin xuebao…”
Get full text
Article