-
3881
WSN key recovery attack based on symmetric matrix decomposition
Published 2018-10-01“…Tongxin xuebao…”
Get full text
Article -
3882
Page write-related scheme for flash translation layer
Published 2013-06-01“…Tongxin xuebao…”
Get full text
Article -
3883
-
3884
Multipath inter-domain routing for named data networking
Published 2015-10-01“…Tongxin xuebao…”
Get full text
Article -
3885
-
3886
Research progress of sensor-cloud security
Published 2018-03-01“…Tongxin xuebao…”
Get full text
Article -
3887
Security analysis of weighted network anonymity based on singular value decomposition
Published 2018-05-01“…Tongxin xuebao…”
Get full text
Article -
3888
New approach to evaluate the capacity of signature-based intrusion detection systems
Published 2007-01-01“…Tongxin xuebao…”
Get full text
Article -
3889
-
3890
-
3891
Large-scale log compressing system based on differential compression
Published 2015-11-01“…Tongxin xuebao…”
Get full text
Article -
3892
-
3893
Provable data possession scheme based on public verification and private verification
Published 2019-03-01“…Tongxin xuebao…”
Get full text
Article -
3894
FilterFA: a multiple string matching algorithm based on specification of character set
Published 2016-12-01“…Tongxin xuebao…”
Get full text
Article -
3895
-
3896
M-APSK phase detection algorithm and parallel carrier synchronization method
Published 2024-03-01“…Tongxin xuebao…”
Get full text
Article -
3897
-
3898
Policy translation and configuration using dynamic template
Published 2019-12-01“…Tongxin xuebao…”
Get full text
Article -
3899
Cooperative MIMO transmission scheme for clustered ad hoc networks
Published 2012-03-01“…Tongxin xuebao…”
Get full text
Article -
3900