Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal on Communications
1000-436X
2010 Issue 5
ID-based transitive signature schemes without random oracle
ma xiao long ; gu li ze ; cui wei ; yang yi xian ; hu zheng ming
..............page:37-43
ID-based transitive signature schemes without random oracle
ma xiao long ; gu li ze ; cui wei ; yang yi xian ; hu zheng ming
..............page:37-43
Application study of Costas arrays in multiuser radar systems
yao jian guo ; huang qing
..............page:60-72
QoS-based sensing scheduling protocol for wireless sensor networks
yao dao yuan ; wang hai lin ; zhang bao xian ; liu hai tao
..............page:128-134
Chosen-key extracting attack to random LSB steganography
chen jia yong ; zhu yue fei ; zhang wei ming ; liu jiu fen
..............page:73-80
Research on DoS detection and reaction of SIP application
zeng shui fei ; he guang yu ; wen ying you ; wang ren bo
..............page:108-112
Study status and prospective of multiview video coding
huo jun yan ; chang yi lin ; li ming ; ma yan zhuo
..............page:113-121
Application study of Costas arrays in multiuser radar systems
yao jian guo ; huang qing
..............page:60-72
Research on secure RSA modulus based on linear feedback shift register applications
jiang zheng tao ; wang yong ; wang yong bin ; wang yu min
..............page:135-140
Extended integer tent maps and dynamic hash function
liu jian dong
..............page:51-59
UC secure one-time signature based broadcast authentication
zhang jun wei ; ma jian feng ; yang li
..............page:31-36,43
Closed-ring feedback based multi-choke fairness algorithm for resilient packet rings
cheng fang ; huang shi guang ; yu zhi yong ; zhang zhi zhong
..............page:22-30
Research on DoS detection and reaction of SIP application
zeng shui fei ; he guang yu ; wen ying you ; wang ren bo
..............page:108-112
Chosen-key extracting attack to random LSB steganography
chen jia yong ; zhu yue fei ; zhang wei ming ; liu jiu fen
..............page:73-80
QoS-based sensing scheduling protocol for wireless sensor networks
yao dao yuan ; wang hai lin ; zhang bao xian ; liu hai tao
..............page:128-134
Study status and prospective of multiview video coding
huo jun yan ; chang yi lin ; li ming ; ma yan zhuo
..............page:113-121
Research on secure RSA modulus based on linear feedback shift register applications
jiang zheng tao ; wang yong ; wang yong bin ; wang yu min
..............page:135-140
Extended integer tent maps and dynamic hash function
liu jian dong
..............page:51-59
Closed-ring feedback based multi-choke fairness algorithm for resilient packet rings
cheng fang ; huang shi guang ; yu zhi yong ; zhang zhi zhong
..............page:22-30
UC secure one-time signature based broadcast authentication
zhang jun wei ; ma jian feng ; yang li
..............page:31-36,43
Composite pulse multipath channel estimation method based on NN rule for IR-UWB
liu zhi yong ; zhang qin yu ; zhang nai tong
..............page:10-15
PFM:a SMS4 algorithm against high-order power analysis attacks
li lang ; li ren fa ; li jing ; wu ke shou
..............page:87-92
Composite pulse multipath channel estimation method based on NN rule for IR-UWB
liu zhi yong ; zhang qin yu ; zhang nai tong
..............page:10-15
Inter-carrier interlerence mitigation based on precoaer design
wang xia ; zhu shi hua
..............page:122-127
ON-CRP:cache replacement policy for opportunistic networks
ye zuo ; chen zhi gang ; zhao ming
..............page:98-107
PFM:a SMS4 algorithm against high-order power analysis attacks
li lang ; li ren fa ; li jing ; wu ke shou
..............page:87-92
ON-CRP:cache replacement policy for opportunistic networks
ye zuo ; chen zhi gang ; zhao ming
..............page:98-107
Inter-carrier interlerence mitigation based on precoaer design
wang xia ; zhu shi hua
..............page:122-127