Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal on Communications
1000-436X
2012 Issue S1
New adaptively secure key-policy attribute-based encryption scheme
LUO Song1;CHEN Zhong2
..............page:270-275
Multi-strategy QoS-aware service selection and ranking model
WU Lei;LIU Yu-long;LIU Shi-jun
..............page:141-147
Power model in power analysis attack
LUO Peng1;2;FENG Deng-guo1;2;ZHOU Yong-bin1;2
..............page:276-281
Network technology research under cloud computing environment
XU Lei1;ZHANG Yun-yong1;WU Jun2;FANG Bing-yi1
..............page:216-221
shi liang di tu shu zi shui yin ji shu yan jiu
sun jian guo
..............page:288
Detecting P2P botnet based on the role of flows
SONG Yuan-zhang1;HE Jun-ting2;ZHANG Bo1;WANG Jun-jie1;WANG An-bang1
..............page:262-269
Adaptive double auction mechanism for cloud resource allocation
DING Ding;LUO Si-wei;AI Li-hua
..............page:132-140
Multi-attribute aware scheduling for inter-datacenter bulk transfers
LI Yang-yang;WANG Hong-bo;ZHANG Peng;DONG Jian-kang;CHENG Shi-duan
..............page:121-131
Research on key technology of vulnerability threat classification
LIU Qi-xu1;ZHANG Chong-bin2;ZHANG Yu-qing1;ZHANG Bao-feng2
..............page:79-87
Max-flow based load-balancing channel assignment algorithm for wireless mesh network
LI Tao-shen;WEI Ya-huan;GE Zhi-hui
..............page:35-40
Topology modeling and analysis of emergency communications network
WANG Wei1;2;ZHAO Wen-hong2
..............page:201-209
Provably secure certificate less blind proxy re-signatures
FENG Tao;LIANG Yi-xin
..............page:58-69,78
Representation model of structured document for multilevel security
SU Mang1;LI Feng-hua2;SHI Guo-zhen3;LI Li3
..............page:222-227
Improvement and formal proof on protocol Otway-Rees
LU Lai-feng1;DUAN Xin-dong2;MA Jian-feng3
..............page:250-254
Mobile detection of replication attacks in wireless sensor network
CHEN Xiang-yi;WANG Liang-min;ZHAN Yong-zhao
..............page:178-185
Parallel complex event processing system based on S4 framework
CHEN Hao1;2;LI Yu1;2;HU Song-lin1;LIANG Ying1
..............page:165-169
Research on multi-tenant data partition mechanism for SaaS application based on shared schema
LI Xiao-na1;2;LI Qing-zhong1;KONG Lan-ju1;PANG Cheng1
..............page:110-120
Effect evaluation of one-hop transmission distance vs performance in wireless sensor network
LIU Zhi-jie1;2;TAO Jun1;2;CHEN Wen-qiang1;2
..............page:255-261
Cloud computing based smartphone social authentication system
LIU Yan-bing;LIU Fei-fei
..............page:28-34
Memory contents patch based virtual machine synchronization
LIAO Jian-wei;CHEN Shan-xiong;LI Li
..............page:157-164
Warehouse mobile access network security associate pre-anticipated notification scheme based on AAA authentication
ZHANG Yong-hui1;2;LIN Zhang-xi3;LIU Jian-hua1;LIANG Quan1
..............page:186-191,200
Research on resource monitoring and billing mechanisms of application engine in cloud computing environment
REN Yi1;ZHANG Jing1;CHEN Hong1;WU Qing-bo1;KONG Jin-zhu1;DAI Hua-dong1;GUAN Gang2
..............page:192-200
Algorithm of NAF scalar multiplication on ECC against SPA
WANG Min;WU Zhen
..............page:228-232
Analysis of DRM game control
MA Guo-jun1;PEI Qing-qi2;JIANG Xiao-hong1
..............page:282-286
Research on selective trust-path search and aggregation in distributed environment
QIN Yan-lin;WU Xiao-ping;GAO Jian-xin
..............page:148-156
Specification and enforcement of personalized privacy policy for social network
WANG Yuan1;SUN Yu-qing1;MA Le-le1;2
..............page:239-249
VNE-AFS:virtual network embedding based on artificial fish swarm
ZHU Qiang;WANG Hui-qiang;LV Hong-wu;WANG Zhen-dong
..............page:170-177
Boardroom electronic voting scheme based on DC-net
LI Long-hai;FU Shao-feng;HUANG Cheng-qiang
..............page:103-109
Classification method for mixed detection signal in the distributed sensor network
LI Kan1;XU Hang1;HUANG Zhong-hua2
..............page:53-57
Network connectivity characteristics for vehicular ad hoc network
YANG Wei-dong1;2;FENG Lin-lin1;LIU Ji-zhao1;ZHU Hong-song2
..............page:48-52
Predicate-based authenticated key exchange protocol with attribute-hiding
LIU Wen-fen;WEI Jiang-hong;HU Xue-xian
..............page:41-47
Static and dynamic verifying method based on extended finite automata for service compositions
ZHANG Guang-quan1;2;DI Hao-jun1;SHI Hui-juan1;YAN Rong-jie2;ZHU Xue-yang2
..............page:1-8
Protocol of GIOP onto RapidIO——RIO-IOP
CHEN Wen-yu;ZENG Ru;PI Wei;LI Wen
..............page:70-78
Study on virtual resource allocation optimization in cloud computing environment
XU Li1;2;ZENG Zhi-bin1;2;YAO Chuan1;2
..............page:9-16
Wireless virtual network embedding algorithm based on link reliability
LUO Juan;LIU Chuan-chuan;LI Ren-fa
..............page:88-95