-
4661
-
4662
-
4663
-
4664
-
4665
-
4666
-
4667
Public key searchable encryption scheme in blockchain-enabled multi-user environment
Published 2021-10-01“…Tongxin xuebao…”
Get full text
Article -
4668
-
4669
Survey of IoT security research: threats, detection and defense
Published 2021-08-01“…Tongxin xuebao…”
Get full text
Article -
4670
-
4671
-
4672
Research on formal security policy model specification and its formal analysis
Published 2006-01-01“…Tongxin xuebao…”
Get full text
Article -
4673
Key predistribution with location and time binding:novel approach against node replication attacks in wireless sensor networks
Published 2010-01-01“…Tongxin xuebao…”
Get full text
Article -
4674
Index modulation aided frequency hopping anti-jamming and encryption method based on rotation scrambling
Published 2021-12-01“…Tongxin xuebao…”
Get full text
Article -
4675
-
4676
Survey on data transmission in Bluetooth technology
Published 2012-04-01“…Tongxin xuebao…”
Get full text
Article -
4677
DPM-based method for tracking maneuvering targets in wireless sensor networks
Published 2010-01-01“…Tongxin xuebao…”
Get full text
Article -
4678
Node-link simultaneous mapping based multi-type service resource orchestration algorithm
Published 2024-04-01“…Tongxin xuebao…”
Get full text
Article -
4679
-
4680
Shape description based on axis of least inertia and chain
Published 2009-01-01“…Tongxin xuebao…”
Get full text
Article