-
581
-
582
Look-up table predistorter based on non-iterative algorithm and indirect learning architecture for TWTA
Published 2006-01-01“…Tongxin xuebao…”
Get full text
Article -
583
False traffic information detection based on weak classifiers integration in vehicular ad hoc networks
Published 2016-08-01“…Tongxin xuebao…”
Get full text
Article -
584
Hadoop cloud platform user dynamic access control model
Published 2017-09-01“…Tongxin xuebao…”
Get full text
Article -
585
-
586
Novel hierarchical identity-based encryption scheme from lattice
Published 2017-11-01“…Tongxin xuebao…”
Get full text
Article -
587
-
588
-
589
-
590
New construction of mutually orthogonal complementary sequence sets
Published 2024-09-01“…Tongxin xuebao…”
Get full text
Article -
591
-
592
-
593
Attribute-based revocable collaborative access control scheme
Published 2021-05-01“…Tongxin xuebao…”
Get full text
Article -
594
-
595
-
596
Prototype verification for integrated sensing and communications:current status and development trends
Published 2023-11-01“…Tongxin xuebao…”
Get full text
Article -
597
-
598
-
599
-
600
Breaking novel and lightweight digital <sub>s</sub> ignature scheme
Published 2013-07-01“…Tongxin xuebao…”
Get full text
Article