-
6121
Secure access authentication scheme for 4G wireless network based on PCL
Published 2012-04-01“…Tongxin xuebao…”
Get full text
Article -
6122
Vulnerabilities scoring approach for cloud SaaS
Published 2016-08-01“…Tongxin xuebao…”
Get full text
Article -
6123
Review of information hiding on Chinese text
Published 2019-09-01“…Tongxin xuebao…”
Get full text
Article -
6124
Robust video watermarking algorithm for H.264/AVC based on texture feature
Published 2012-03-01“…Tongxin xuebao…”
Get full text
Article -
6125
ID-based wireless authentication scheme with anonymity
Published 2009-01-01“…Tongxin xuebao…”
Get full text
Article -
6126
Sensitivity analysis of the channel estimation deviation to the MAP decoding algorithm
Published 2006-01-01“…Tongxin xuebao…”
Get full text
Article -
6127
Analysis and construction for threshold signature scheme based on game theory
Published 2015-05-01“…Tongxin xuebao…”
Get full text
Article -
6128
Optimization and research on RFID anti-collision algorithm based on adaptive multi-dimension division code
Published 2013-09-01“…Tongxin xuebao…”
Get full text
Article -
6129
Survey of terahertz communication technology
Published 2020-05-01“…Tongxin xuebao…”
Get full text
Article -
6130
-
6131
Neural network recognition algorithm of breath sounds based on SVM
Published 2014-10-01“…Tongxin xuebao…”
Get full text
Article -
6132
-
6133
-
6134
-
6135
Research on GPS geometry-based observational stochastic error model
Published 2019-09-01“…Tongxin xuebao…”
Get full text
Article -
6136
Text coverless information hiding method based on synonyms expansion and label delivery mechanism
Published 2021-09-01“…Tongxin xuebao…”
Get full text
Article -
6137
-
6138
-
6139
Trust chain generating and updating algorithm for dual redundancy system
Published 2017-01-01“…Tongxin xuebao…”
Get full text
Article -
6140