Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Beijing Jiaotong University
1673-0291
2013 Issue 5
Security analysis in SPKI/SDSI2.0
GENG Xiuhua;HE Yongzhong
..............page:23-28
Numeration of generalized linear orthomorphisms over the galois field Fnq
HAN Haiqing;ZHANG Huanguo
..............page:123-127
SLA-based dynamic trust evaluation for cloud computing
ZHAO Pingting;HAN Zhen;HE Yongzhong
..............page:80-87
Survey on techniques of passive-blind image forensics based on JPEG features
SUN Guozi;LIU Liying;YANG Yitao
..............page:112-117
Digital image processing array circuit based on multi-core technology
LUO Li;LI Ruijing;SHEN Hong
..............page:157-161
Lee weight MacWilliams identity of the linear codes over F2+ uF2+ vF2+ uvF2
XU Xiaofang;HAN Haiqing
..............page:128-131
High speed train transmission noise and structural noise separation
NA Yueyue;XIE Chong
..............page:143-150
Mobile node inter-domain Pre-HandOver method based on MP2P
GUO Fangfang;LIU Yunxia;WANG Shuaishuai;XING Yangyang
..............page:53-57
Analysis of potential difference of mechanical insulating joint in high-speed railway station
BI Hongjun;ZHAO Xing;ZHANG Minhui
..............page:151-156
Randomization of soft keyboard layout based on cellular automata
LI Pengwei;FU Jianming;SHA Letian;DING Shuang
..............page:105-111,131
A ranked method of ciphertext retrieval based on history
LIU Wenzhuo;CAO Tianjie
..............page:118-122
SDKEY-based partition data protection of mobile terminal
LI Meihong;DU Ye;LIU Jiqiang
..............page:19-22
Supervision system for P2P traffic based on NDIS intermediate driver
DU Ye;LI Meihong;LI Jieyuan
..............page:29-34
Formal analysis of power separation mechanism based on Biba model
LI Lin;LU Kai;GUO Qiang;CHEN Yonggang;FAN Xiubin
..............page:1-7
Design and implementation of fine-grained RBAC module based on AOP
SHAO Qifeng;HAN Yumin
..............page:48-52
Trusted generation method for event logs based on TCM
WANG Jian;CHENG Shuaishuai
..............page:93-99
Research on Chord6 model with topology matching ,inter-domains
GUO Fangfang;WANG Shuaishuai;LIU Yunxia
..............page:35-40
Software design and optimization of video processing based on DM6467
YAO Chunlian;GUO Keyou;RUAN Qiuqi;WAN Lili
..............page:162-167
Fuzzing technology for private network protocol testing
PENG Yong;WANG Ting;XIONG Qi;DAI Zhonghua;YI Shengwei;GAO Haihui
..............page:8-12
A k-anonymous algorithm in location privacy protection based on circular zoning
ZHAO Zemao;HU Huidong;ZHANG Fan;ZHANG Pin;ZHOU Jianqin
..............page:13-18
Game-based efficient and reliable routing algorithm in wireless Mesh networks
DU Ruiying;CHEN Jing;HE Kun;YAO Shixiong
..............page:41-47
A scheme of trusted virtualization platform based on PTM
JIANG Yichen;HAN Zhen;ZHANG Dawei
..............page:67-74
Feasibility study on unequal error protection fountain codes with applications to telegram coding
JIANG Daming;HOU Xiaobin;SHAN Dong;FENG Xisheng
..............page:138-142
Design and implementation of a context-based Android mobile terminal trusted running control system
QU Haipeng;AO Yingge;YAN Min;YU Aimin;ZHAO Baohua
..............page:100-104