-
321
Single password authentication method for remote user based on mobile terminal assistance
Published 2019-02-01“…Tongxin xuebao…”
Get full text
Article -
322
-
323
-
324
-
325
-
326
Design keyed Hash function based on couple chaotic system
Published 2006-01-01“…Tongxin xuebao…”
Get full text
Article -
327
PSR-SQUARES: SQL reverse synthesis system based on program space reducer
Published 2023-11-01“…Tongxin xuebao…”
Get full text
Article -
328
-
329
Hidden Markov model based P2P flow identification technique
Published 2012-06-01“…Tongxin xuebao…”
Get full text
Article -
330
R-Net grid monitoring and alarming system design
Published 2006-01-01“…Tongxin xuebao…”
Get full text
Article -
331
-
332
Dynamic traffic balancing scheme for LB-BvN to guarantee in-order packet delivering
Published 2011-01-01“…Tongxin xuebao…”
Get full text
Article -
333
-
334
Method based on contrastive learning for fine-grained unknown malicious traffic classification
Published 2022-10-01“…Tongxin xuebao…”
Get full text
Article -
335
Interference graph based adaptive interference coordination method in indoor UDN
Published 2019-09-01“…Tongxin xuebao…”
Get full text
Article -
336
High-throughput and low-overhead probabilistic routing based on multi-player bargaining game for opportunistic networks
Published 2015-06-01“…Tongxin xuebao…”
Get full text
Article -
337
SYN flood attack defense strategy for asymmetric routing
Published 2013-08-01“…Tongxin xuebao…”
Get full text
Article -
338
Bit error rate analysis model of M-APSK based on total probability formula
Published 2024-07-01“…Tongxin xuebao…”
Get full text
Article -
339
-
340