-
281
-
282
-
283
Biclique cryptanalysis on lightweight block ciphers I-PRESENT-80 and I-PRESENT-128
Published 2017-11-01“…Tongxin xuebao…”
Get full text
Article -
284
Improved meet-in-the-middle attack on reduced-round Kiasu-BC algorithm
Published 2022-07-01“…Tongxin xuebao…”
Get full text
Article -
285
-
286
-
287
-
288
New remote authorization protocol for vehicle diagnosis
Published 2014-11-01“…Tongxin xuebao…”
Get full text
Article -
289
UGC<sup>3</sup>:a covert communication method defense against censorship
Published 2012-08-01“…Tongxin xuebao…”
Get full text
Article -
290
Iterative channel estimation and decoding algorithm for quasi-coherent demodulation of Turbo coded GMSK signals
Published 2006-01-01“…Tongxin xuebao…”
Get full text
Article -
291
Joint optimization method of intelligent service arrangement and computing-networking resource allocation for MEC
Published 2023-07-01“…Tongxin xuebao…”
Get full text
Article -
292
-
293
-
294
-
295
-
296
Piecewise-linear companding transform for peak-to-average power ratio reduction of OFDM signals
Published 2011-01-01“…Tongxin xuebao…”
Get full text
Article -
297
-
298
-
299
Power analysis attack of HMAC based on SM3
Published 2016-05-01“…Tongxin xuebao…”
Get full text
Article -
300
Availability based trust evaluation model for MANET
Published 2010-01-01“…Tongxin xuebao…”
Get full text
Article