..............page:802-805
..............page:806-816
..............page:817-830
..............page:831-835+847
Resource Allocation for Two-Hop Relay Networks
LIANG Liang;FENG Gang;National Key Laboratory of Science and Technology on Communications;University of Electronic Science and Technology of China;College of Communication Engineering;Chongqing University;
..............page:836-841
..............page:842-847
..............page:848-851
..............page:852-856
..............page:857-861
..............page:862-868
..............page:869-874
Tunable X-Ray SASE FEL Numerical Simulation
GU Xiao-wei;MENG Lin;School of Information Science and Technology;Zhejiang Sci-Tech University;School of Physical Electronics;University of Electronic Science and Technology of China;
..............page:875-879+915
..............page:880-884
..............page:885-889
..............page:890-894
..............page:895-899+925
..............page:900-904
..............page:905-910
..............page:911-915
..............page:916-920
..............page:921-925
On the Security of an Identity-Based Ring Signature Scheme
WU Huai;SUN Ying;XU Chun-xiang;WU Wei;School of Computer Science and Engineering;University of Electronic Science and Technology of China;Sichuan electric power research institute;School of Mathematics and Computer Science;Fujian Normal University;
..............page:926-929+943
..............page:930-934
Rough Set Metric for Weak Functional Dependency of Equivalence Class
XUE Jin-rong;ZHANG Hong-bin;School of Computer Science and Technology Beijing Institute of Technology;Software Security Engineering Key Laboratory of Beijing Municipality;The Testing Center for Quality of Security and Police Electronic Product Under the Ministry of public security;
..............page:935-938
..............page:939-943
..............page:944-950
..............page:951-954
..............page:955-960
..............page:961-964