Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Communications Technology
1002-0802
2003 Issue 4
The Technology of IPSec Virtual Private Networks
han jin rong ; wang xin mei
..............page:85-86,92
The Authorization Model based on RBAC in OA System
xu xiao tao ; hong fan
..............page:87-89
Research on the Third- Generation OAS Security Design and Realization
zeng jin song ; xue li min
..............page:90-92
The Key Management Services and Its Design and Implementation in PKI
xing qi liang ; chen xiao su
..............page:93-94
Analysis on Technology of IP Trace Back
yao jian guo ; zhao zhan sheng
..............page:82-84
Polynomial Expression in Interpolation Attack
zhang li qiong ; lv shu wang
..............page:80-81
Application of Error- Correction Code in Steganographic Arithmetic
chen qing yuan ; liu zhen hua ; lv shu wang
..............page:78-79,81
Some Statistical Results Applied in Steganalysis
di wei dong ; liu zhen hua ; lv shu wang
..............page:75-77
Theoretical Design for a Class of New Chaotic Stream Cipher
hu guo jie ; feng zheng jin
..............page:73-74
A Service Characteristics Based Anomaly Detection Approach in NIDS
feng yu ; zhu hai yang ; yang zuo ; du xin hua
..............page:71-72,77
A Secure Scheme for Future Tactical Networks
jin yan liang ; luo zong yang ; yang yu hang
..............page:68-70
A New Blind Adaptive Multiuser Detection Method
wang yan ; fu yong qing ; sun xiao yan
..............page:63-65
A Step -size Sign Algorithm for DS -CDMA Multiuser Detection
sun li ping ; hu guang rui
..............page:61-62,65
Uplink Transmitting Power Control in CDMA Cellular Systems
lv ping bao ; xie jian ying
..............page:39-40,43
The Spectral Analysis Based on TI C5402 DSK
qiao rui ping ; xing zheng bei ; li zhen an ; dang sheng mao
..............page:36-38
Joint Source- Channel Coding Based on Multiple Descriptions
chen hai lin ; yang yu hang ; xing bo
..............page:33-35
Policy Application in SNMPv3- Based Network Management
zhang hui ; sui dong liang ; zhang xiao zuo
..............page:31-32,35
Research & Design of TMG in Softswitch Network
zhang jie bin ; huang ben xiong ; hu guang
..............page:22-24
A Distributed All- IP Wireless Access Network Proposal
yu yi min ; huang zai lu ; zhou zong yi ; tian chen
..............page:25-27,30
Research of Secure MPLS Technology
zhang bin ; xu li
..............page:95-96
Employing SNMPv2 over IPSec or SNMPv3 to Provide Secure Network Management
gong hua zhi ; shi bing xin
..............page:97-98,100
An Optical Network Security Project based on Waveband Routing
tang yao ; yin min ; zou zi li
..............page:99-100
Research on the Extension of Base CRL in X. 509 Version 4
liu ai jiang ; xu chang feng ; he da ke
..............page:101-102,104
Security Communication Protocol Based on Third Party
lv shu wang ; wang cheng ce ; huang hong mei
..............page:103-104
The Elements of Optical Soliton Transmission and Its System Key Techniques
mei qiong ; zhang jiang zuo
..............page:58-60
Technology of Space Diversity
gu sheng fei ; yang yu hang
..............page:56-57
Improved Decode Arithmetic of Two -Way Supervised Complex Rotary Codes
lin kai ; zou sheng tang ; shi zhi ping ; zhang xue zhu
..............page:53-55
MATLAB Simulating Analysis on IMD of RF Power Amplifiers
huang dan ; zuo shu yue ; tian xin guang
..............page:49-52
Space- Time Virtual DOA Estimation
wang bin ; shi xiao wei
..............page:44-45,48
A Soft- Decision Method of RS Code
zhang xue zhu ; zhou zhi zhong ; shi zhi ping ; yang hai fen
..............page:41-43
Controlling Update Time for Multibit Tries in IP Routing Lookup
su gong chao ; li le min
..............page:1-3
Grid Technologies Based Globus and Its Military Application
he xiao xin ; du jian zhong ; zhang xin qiang
..............page:4-7
Research and Implementation Analysis of IGMPv3 Protocol
zhu hai yang ; du xin hua
..............page:8-10,13
Freespace Optical Access Network Technology
xiao peng cheng ; zeng qing ji ; huang jun ; liu ji min
..............page:11-13
The Planning Method of WDM Networks
wang qiang min ; rong meng tian
..............page:14-16
Resilient Packet Ring Technology
zhao zheng fu ; zeng qing ji ; zhu zuo
..............page:17-19