Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal on Communications
1000-436X
2011 Issue 5
Research and design of parallel architecture processor for elliptic curve cryptography
YANG Xiao-hui;DAI Zi-bin;LI Miao;ZHANG Yong-fu
..............page:70-77
Practical parallel packet switch architecture based on CIOQ
REN Tao;LAN Ju-long;HU Hong-chao
..............page:14-21,32
On the construction of single cycle T-functions
YANG Xiao1;2;WU Chuan-kun1;WANG Ya-xiang3
..............page:162-168
Evaluation and analysis of the computation cost of linear network coding
PU Bao-xing1;WANG Wei-ping2
..............page:47-55
Cryptanalysis and design of signature schemes with identity ambiguity in the standard model
ZHANG Ming-wu1;YANG Bo1;YAO Jin-tao1;ZHANG Wen-zheng2
..............page:40-46
Routing algorithm for MPLS traffic engineering in satellite network
XIAO Fu1;2;3;SUN Li-juan1;2;3;YE Xiao-guo1;2;WANG Ru-chuan1;2;3
..............page:104-111
Research on the risk adjacency matrix based on attack graphs
YE Yun;XU Xi-shan;JIA Yan;QI Zhi-chang;CHENG Wen-cong
..............page:112-120
Separated multi streams transmitting method based on SIP+P2P system
LEI Wei-min1;2;ZHANG Xiu-wu2;3;JIA Jun-ying3;YU Bo3
..............page:82-88
Collision and information error of topologies in clustering protocol
HAN Jiang-hong1;2;WEI Zhen1;2;CAI Zhi-wen1;HAN Dong3;WEI Zhen-chun1;2
..............page:97-103
Reliable multicast in wireless mesh networks based on routing quality
HU Zhi-yuan1;WANG Xiao-xiang1;ZHANG Xian2
..............page:1-8
Analysis and improvement of sensor networks security protocol
YAN Li-li1;2;PENG Dai-yuan1;GAO Yue-xiang1;3
..............page:139-145
Low-complexity TOA estimation using sawtooth-waveform matching in non-coherent impulse radio systems
ZHENG Lin1;FU Jie-lin1;2;LIU Zheng-hong1;QIU Hong-bing1;LIN Ji-ming1
..............page:33-39,46
Pseudorange estimation algorithm combining code and carrier phase based on Gaussian sum particle filtering
LI Li-min1;2;GONG Wen-bin1;LIU Hui-jie1;2;YU Jin-pei1;2
..............page:9-13
Cryptanalysis of some chaos-based keyed hash functions
ZHENG Shi-hui1;ZHANG Guo-yan3;YANG Yi-xian1;2;LI Zhong-xian1
..............page:146-152
Research on incentive mechanism integrated trust management for P2P networks
HU Jian-li1;ZHOU Bin2;WU Quan-yuan2
..............page:22-32
Short signature based on factoring problem in the standard model
WANG Zhi-wei1;2;ZHANG Wei1;2
..............page:78-81
SL-n iterative localization algorithm in wireless sensor networks
LUO Xu;CHAI Li;YANG Jun
..............page:129-138,145
Provable secure trusted protocol for network storage
DUAN Xin-dong;MA Jian-feng
..............page:169-174
Front-feedback-based two-stage switch architecture
SHEN Zhi-jun;ZENG Hua-shen;XIA Yu
..............page:56-62
Research on discovering multi-step attack patterns based on clustering IDS alert sequences
MEI Hai-bin1;2;GONG Jian1;ZHANG Ming-hua2
..............page:63-69
Decision-level fusion model of multi-source intrusion detection alerts
LI Zhi-dong;YANG Wu;WANG Wei;MAN Da-peng
..............page:121-128
Identity-based anonymity authentication protocol in the heterogeneous wireless network
HOU Hui-fang1;2;JI Xin-sheng2;LIU Guang-qiang1
..............page:153-161
Trusted routing based on D-S evidence theory in wireless mesh network
YANG Kai;MA Jian-feng;YANG Chao
..............page:89-96,103