-
1
-
2
关于对Shrinking Generator及Self-Shrinking Generator的熵漏分析
Published 1996-01-01“…Tongxin xuebao…”
Get full text
Article -
3
-
4
-
5
-
6
-
7
Composable information flow verification for service chain based on model checking
Published 2014-11-01“…Tongxin xuebao…”
Get full text
Article -
8
Research on penalty mechanism against selfish behaviors in anonymous communication system
Published 2006-01-01“…Tongxin xuebao…”
Get full text
Article -
9
Provably secure and efficient proxy signature scheme
Published 2014-08-01“…Tongxin xuebao…”
Get full text
Article -
10
-
11
-
12
Perceptual image hashing sensitive to content modification
Published 2012-11-01“…Tongxin xuebao…”
Get full text
Article -
13
Blockchain digital forensics: technology and architecture
Published 2024-12-01“…Tongxin xuebao…”
Get full text
Article -
14
-
15
Deterministic upper bounds on QoS performance about wireless ad hoc network based on network calculus
Published 2008-01-01“…Tongxin xuebao…”
Get full text
Article -
16
-
17
Survey of several key technologies for 5G
Published 2016-07-01“…Tongxin xuebao…”
Get full text
Article -
18
-
19
-
20