-
881
Trojan message attack on the concatenated hash functions
Published 2016-08-01“…Tongxin xuebao…”
Get full text
Article -
882
-
883
Multi-threshold algorithm about image segmentation based on polynomial uniform approximation
Published 2016-10-01“…Tongxin xuebao…”
Get full text
Article -
884
-
885
-
886
Inter-frame image coding scheme of color video based on Delaunay triangulation mesh
Published 2007-01-01“…Tongxin xuebao…”
Get full text
Article -
887
-
888
-
889
-
890
Spectrum knowledge graph: an intelligent engine facing future spectrum management
Published 2021-05-01“…Tongxin xuebao…”
Get full text
Article -
891
Dynamic spectrum allocation strategy with probabilistic feedback mechanism and performance analysis
Published 2015-07-01“…Tongxin xuebao…”
Get full text
Article -
892
-
893
Research on CID based compression mechanism for WiMAX
Published 2011-01-01“…Tongxin xuebao…”
Get full text
Article -
894
-
895
-
896
-
897
Worm propagation modeling in cloud security
Published 2012-04-01“…Tongxin xuebao…”
Get full text
Article -
898
-
899
-
900