-
6581
Verifiably private outsourcing scheme for multivariate polynomial evaluation
Published 2015-08-01“…Tongxin xuebao…”
Get full text
Article -
6582
-
6583
-
6584
3-subset meet-in-the-middle attack on block cipher TWIS
Published 2014-06-01“…Tongxin xuebao…”
Get full text
Article -
6585
Dynamic fairness evaluation framework for cloud computing
Published 2014-07-01“…Tongxin xuebao…”
Get full text
Article -
6586
-
6587
A Grand Gathering──A largest-scale international communication exhibition will be held in south China
Published 1995-01-01“…Tongxin xuebao…”
Get full text
Article -
6588
Method for discovering intra-session network coding opportunity in wireless ad hoc networks
Published 2011-01-01“…Tongxin xuebao…”
Get full text
Article -
6589
-
6590
Information hiding algorithm based on mapping and structure data of 3D model
Published 2019-05-01“…Tongxin xuebao…”
Get full text
Article -
6591
Approach to deep Web data acquiring based on circular strategy and dynamic knowledge
Published 2012-10-01“…Tongxin xuebao…”
Get full text
Article -
6592
Research on resource scheduling of reconfigurable optical networks for distributed services
Published 2008-01-01“…Tongxin xuebao…”
Get full text
Article -
6593
Virtualization based network measurement platform
Published 2013-09-01“…Tongxin xuebao…”
Get full text
Article -
6594
-
6595
-
6596
Recognition method of digital modulation signals over non-Gaussian noise in cognitive radio
Published 2014-01-01“…Tongxin xuebao…”
Get full text
Article -
6597
-
6598
Authorization delegation mechanism based trust level in grid computing
Published 2008-01-01“…Tongxin xuebao…”
Get full text
Article -
6599
CS-based data collection method for airborne clustering WSN
Published 2015-05-01“…Tongxin xuebao…”
Get full text
Article -
6600
Relay selection algorithm based on selfish behavior analysis in ultra-dense D2D
Published 2021-04-01“…Tongxin xuebao…”
Get full text
Article