-
5101
Attack-defense game model of node traces privacy preserving for vehicle ad hoc networks
Published 2013-08-01“…Tongxin xuebao…”
Get full text
Article -
5102
-
5103
-
5104
Efficient and scalable architecture for searchable symmetric encryption
Published 2017-08-01“…Tongxin xuebao…”
Get full text
Article -
5105
Networking model and traffic analysis for integrating ad hoc and LEO satellite terminals
Published 2006-01-01“…Tongxin xuebao…”
Get full text
Article -
5106
α-spectrum estimation method for ARMA SαS process based on FLOC
Published 2007-01-01“…Tongxin xuebao…”
Get full text
Article -
5107
-
5108
-
5109
-
5110
-
5111
-
5112
New adaptively secure key-policy attribute-based encryption scheme
Published 2012-09-01“…Tongxin xuebao…”
Get full text
Article -
5113
Approach to detecting SQL injection behaviors in network environment
Published 2016-02-01“…Tongxin xuebao…”
Get full text
Article -
5114
Research on cloud storage systems supporting secure sharing
Published 2017-10-01“…Tongxin xuebao…”
Get full text
Article -
5115
Design of network management and regulation system over flexible reconfiguration
Published 2012-11-01“…Tongxin xuebao…”
Get full text
Article -
5116
Model for virtual corporations partner selection based on adaptive genetic algorithm
Published 2009-01-01“…Tongxin xuebao…”
Get full text
Article -
5117
Heterogeneous executor scheduling algorithm for mimic cloud service
Published 2020-03-01“…Tongxin xuebao…”
Get full text
Article -
5118
Routing algorithm for railway monitoring linear WSN based on improved PSO
Published 2022-05-01“…Tongxin xuebao…”
Get full text
Article -
5119
Resource management in blockchain-enabled heterogeneous edge computing system
Published 2020-10-01“…Tongxin xuebao…”
Get full text
Article -
5120