-
1341
Investigation and analysis of the weakness and efficiency of generalized cycling attacks on RSA modulus
Published 2009-01-01“…Tongxin xuebao…”
Get full text
Article -
1342
Security-enhanced live migration based on SGX for virtual machine
Published 2017-09-01“…Tongxin xuebao…”
Get full text
Article -
1343
Parallel MAC protocol based on geographical location information and power control in ad hoc networks
Published 2008-01-01“…Tongxin xuebao…”
Get full text
Article -
1344
Ternary polynomial based key management scheme for wireless sensor network
Published 2013-12-01“…Tongxin xuebao…”
Get full text
Article -
1345
Linear property and optimal design of MARS-like cryptographic structure
Published 2021-04-01“…Tongxin xuebao…”
Get full text
Article -
1346
Load prediction based elastic resource scheduling strategy in Flink
Published 2020-10-01“…Tongxin xuebao…”
Get full text
Article -
1347
Privacy preserving approach based on proximity privacy for numerical sensitive attributes
Published 2015-04-01“…Tongxin xuebao…”
Get full text
Article -
1348
Secure OFDM transmission scheme based on two-stage chaos mapping
Published 2016-07-01“…Tongxin xuebao…”
Get full text
Article -
1349
-
1350
-
1351
Research progress on electromagnetic spectrum multidimensional situation compressed mapping technology
Published 2023-11-01“…Tongxin xuebao…”
Get full text
Article -
1352
Global efficiency estimation method of complex network based on fractal property
Published 2020-07-01“…Tongxin xuebao…”
Get full text
Article -
1353
Node localization algorithm based on kernel function and Markov chains
Published 2010-01-01“…Tongxin xuebao…”
Get full text
Article -
1354
Deduplication algorithm based on condensed nearest neighbor rule for deduplication metadata
Published 2015-08-01“…Tongxin xuebao…”
Get full text
Article -
1355
-
1356
Dummy trajectory privacy protection scheme for trajectory publishing based on the spatiotemporal correlation
Published 2016-12-01“…Tongxin xuebao…”
Get full text
Article -
1357
-
1358
-
1359
Feature dependence graph based source code loophole detection method
Published 2023-01-01“…Tongxin xuebao…”
Get full text
Article -
1360