Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Chinese Journal of Computers
0254-4164
2010 Issue 1
Delay Optimization Based Overlay Routing Strategy
ye zuo ; li yi zhong ; xia qin
..............page:36-44
The Three-Party Password-Authenticated Key Exchange Protocol with Stronger Security
ding xiao fei ; ma chuan gui
..............page:111-118
The System Architecture and Security Structure of Trusted PDA
zhao bo ; zhang huan guo ; li jing ; chen zuo ; wen song
..............page:82-92
Identity-Based Multi-Signcryption Scheme without Random Oracles
zhang bo ; xu qiu liang
..............page:103-110
Research on the Framework of Morphological Associative Memories
feng nai qin ; liu chun hong ; zhang cong pin ; xu jiu cheng ; wang shuang xi
..............page:157-166
Virtual Network with High Performance: VegaNet
chen wen long ; xu ming wei ; yang yang ; li zuo ; ma dong chao
..............page:63-73
An Identity (ID)-Based and Self-Certified Secret Sharing Scheme
pei qing zuo ; ma jian feng ; pang liao jun ; zhang hong bin
..............page:152-156
Geometry Knowledge Acquisition and Representation on Ontology
zhong xiu qin ; fu hong guang ; zuo li ; huang bin
..............page:167-174
Modeling Botnets\' Similarity Based on Communication Feature Extraction and IP Assembly
li run heng ; wang ming hua ; jia yan
..............page:45-54
A Distributed Usage Control System Based on Trusted Computing
chu xiao bo ; qin yu
..............page:93-102
A Formal Method Based on Noninterference for Analyzing Trust Chain of Trusted Computing Platform
zhang xing ; huang qiang ; shen chang xiang
..............page:74-81
Methodology for Automatic Inference of Task Hierarchies in Complex Systems
gao chong nan ; yu hong liang ; zheng wei min
..............page:119-127
Energy-Hole Avoidance for WSN Based on Adjust Transmission Power
zeng zhi wen ; chen zhi gang ; liu an feng
..............page:12-22
Research on Privacy-Protection Policy for Pervasive Computing
wei zhi qiang ; kang mi jun ; jia dong ning ; yin bo ; zhou zuo
..............page:128-138
Performance Analysis of a Network-Layer Soft Vertical Handoff Scheme Without Packet Reordering
shu tong ; liu min ; li zhong cheng
..............page:23-35
Research on Trust Framework in Multi-Agent System from the Cognitive View
wang jia ; feng zhi yong ; xu chao ; xu guang quan
..............page:139-151
Adaptive Lifting Wavelet Transform and Image Compression Via Texture
zhang jun ; cheng li zhi ; yang hai bin ; huang kui hua
..............page:184-192
An Efficient Genuine-Video Identification Algorithm: TDIA
zhou guo rui ; wang wen jiang ; sun shi xin
..............page:175-183