Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Journal on Communications
1000-436X
2009 Issue 3
Method to generate attack graphs for assessing the overall security of networks
MAN Da-peng;ZHOU Yuan;YANG Wu;YANG Yong-tian
..............
page:1-5
Non-interference trusted model based on processes
ZHANG Xing;CHEN You-lei;SHEN Chang-xiang
..............
page:6-11
Rapid video copy detection on compressed domain
ZHANG Yong-dong;ZHANG Dong-ming;GUO Jun-bo;TANG Sheng
..............
page:135-140
Lite-CA based key pre-distribution scheme in wireless sensor network
PAN Yun;WANG Li-cheng;CAO Zhen-fu;LI Jian
..............
page:130-134
Analysis for e-commerce protocols based on ProVerif
GUO Yun-chuan;DING Li;ZHOU Yuan;GUO Li
..............
page:125-129
Multi-pattern matching algorithm based on heterogeneous implicit storage
LI Zhi-dong;YANG Wu;ZHANG Ru-bo;WANG Wei
..............
page:119-124
Novel hybrid OVSF-TH-UWB communication system
ZENG Fan-zi;TUO Ying-ying;LUO Juan;LI Ren-fa
..............
page:112-118,124
Stability module of path compression for on-demand ad hoc routing
XU Jia;LI Zhi;ZHOU Yao;LIU Feng-yu
..............
page:104-111
Channel compensation of speaker identification based on maximum a posteriori
GAO Rong-chun;HAN Ji-qing;ZHANG Lei
..............
page:99-103
Block data hiding based on the standard array of linear block codes
GAO Bao-jian;WANG Wei;WANG Jun
..............
page:93-98
Novel decoding of convolutional codes for OCDMA system
ZHOU Hai-xian;XU Guo-liang;YAO Wei
..............
page:89-92
Study on performance optimization for Chinese speech retrieval
ZHENG Tie-ran;HAN Ji-qing;LI Hai-yang
..............
page:84-88
Research on a stable clustering algorithm based on the optimal connectivity power for wireless sensor networks
LI Fang-min;LIU Xin-hua;KUANG Hai-lan;FANG Yi-lin
..............
page:75-83
Measurement and modeling of the peer-to-peer sharing objects popularity
GUO Zhen-bin;QIU Zheng-ding
..............
page:66-74
Multi-level feedback based time synchronization algorithm for wireless sensor networks
HUANGFU Wei;ZHOU Xin-yun;CHEN Can-feng
..............
page:59-65
Multi-channel recovery data flow parallel transmission and control method
ZHANG Bing;LU Zheng-tian;LI Tao
..............
page:54-58
Adaptive multiple-modalities data compression algorithm using wavelet for wireless sensor networks
ZHU Tie-jun;LIN Ya-ping;ZHOU Si-wang;XU Xiao-long
..............
page:48-53
HitIct: Chinese corpus for the evaluation of lossless compression algorithms
CHANG Wei-ling;YUN Xiao-chun;FANG Bin-xing;WANG Shu-peng
..............
page:42-47
Distributed network management system with load balancing
SUN Yan-tao;YANG Fang-nan;SHI Zhi-qiang
..............
page:34-41
ID-based threshold decryption with non-reconstruction of the private key
QIN Bao-shan;ZHOU Yuan
..............
page:27-33
Hybrid-structured onion scheme against replay attack of MIX
SHI Jin-qiao;FANG Bin-xing;GUO Li;WANG Li-hong
..............
page:21-26
Model of coorperation defense DdoS attack based on client reputation
TIAN Jun-feng;ZHU Hong-tao;SUN Dong-dong;BI Zhi-ming;LIU Qian
..............
page:12-20