-
4181
-
4182
Query recovery attacks against conjunctive keyword searchable encryption
Published 2024-08-01“…Tongxin xuebao…”
Get full text
Article -
4183
-
4184
Computation offloading and resource allocation strategy based on deep reinforcement learning
Published 2023-07-01“…Tongxin xuebao…”
Get full text
Article -
4185
-
4186
-
4187
-
4188
Multiple access based on three-stage modulation in multi-band OFDM-UWB system
Published 2007-01-01“…Tongxin xuebao…”
Get full text
Article -
4189
-
4190
Intelligent prediction method of virtual network function resource capacity for polymorphic network service slicing
Published 2022-06-01“…Tongxin xuebao…”
Get full text
Article -
4191
-
4192
-
4193
Space-time coding scheme for the paired weak user in MIMO-NOMA systems
Published 2018-06-01“…Tongxin xuebao…”
Get full text
Article -
4194
-
4195
-
4196
Efficient top-k string similarity query algorithms
Published 2014-12-01“…Tongxin xuebao…”
Get full text
Article -
4197
-
4198
WLAN Mesh security association scheme in trusted computing environment
Published 2014-07-01“…Tongxin xuebao…”
Get full text
Article -
4199
Electronic medical records sharing solution based on Hyperledger Fabric
Published 2024-10-01“…Tongxin xuebao…”
Get full text
Article -
4200