-
601
Copyright protection algorithm based on differential privacy deep fake fingerprint detection model
Published 2022-09-01“…Tongxin xuebao…”
Get full text
Article -
602
Research on fault-recovery model and scheme in dual-system redundancy router
Published 2006-01-01“…Tongxin xuebao…”
Get full text
Article -
603
-
604
Video transcoding for H.264 in the compressed domain and key techniques analysis
Published 2006-01-01“…Tongxin xuebao…”
Get full text
Article -
605
Privacy preserving friend discovery cross domain scheme using re-encryption in mobile social networks
Published 2017-10-01“…Tongxin xuebao…”
Get full text
Article -
606
-
607
-
608
-
609
Hierarchical data grid resource allocation based on quotient space theory
Published 2013-06-01“…Tongxin xuebao…”
Get full text
Article -
610
-
611
-
612
-
613
-
614
Task-based access control mode of peer-to-peer network based on fuzzy theory
Published 2017-02-01“…Tongxin xuebao…”
Get full text
Article -
615
-
616
Hybird group key management scheme for wireless sensor networks
Published 2010-01-01“…Tongxin xuebao…”
Get full text
Article -
617
-
618
-
619
Attribute-based authenticated key agreement protocol supporting revocation
Published 2014-05-01“…Tongxin xuebao…”
Get full text
Article -
620
Cascaded algorithm for background modeling using pixel-based and block-based methods
Published 2013-04-01“…Tongxin xuebao…”
Get full text
Article