-
6081
-
6082
Research on the risk adjacency matrix based on attack graphs
Published 2011-01-01“…Tongxin xuebao…”
Get full text
Article -
6083
-
6084
Identity-based encryption scheme against adaptive leakage
Published 2012-07-01“…Tongxin xuebao…”
Get full text
Article -
6085
Reliable steganalysis of color images based on color gradient sequence
Published 2011-01-01“…Tongxin xuebao…”
Get full text
Article -
6086
Contact plan design based on bi-directional particle swarm optimization in satellite network
Published 2019-08-01“…Tongxin xuebao…”
Get full text
Article -
6087
Enhanced Beidou user equipment access authentication protocol based on location key
Published 2022-11-01“…Tongxin xuebao…”
Get full text
Article -
6088
-
6089
-
6090
Approach to worm early warning based on local victim behavior
Published 2007-01-01“…Tongxin xuebao…”
Get full text
Article -
6091
-
6092
-
6093
-
6094
Efficiency identity-based threshold group signature scheme
Published 2009-01-01“…Tongxin xuebao…”
Get full text
Article -
6095
-
6096
Improved meet-in-the-middle attack on ARIA cipher
Published 2015-03-01“…Tongxin xuebao…”
Get full text
Article -
6097
CAM-MAC: channel aware multi-channel MAC protocol in cognitive radio network
Published 2014-04-01“…Tongxin xuebao…”
Get full text
Article -
6098
Performance analysis of broadband self-interference cancellation at RF domain in co-frequency co-time full duplex systems
Published 2016-09-01“…Tongxin xuebao…”
Get full text
Article -
6099
Security sharing scheme for encrypted data in cloud storage
Published 2015-10-01“…Tongxin xuebao…”
Get full text
Article -
6100
Efficient heuristic algorithm for the mobile sink routing problem
Published 2011-01-01“…Tongxin xuebao…”
Get full text
Article