Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal on Communications
1000-436X
2015 Issue 9
Secure sensitive data deduplication schemes based on deterministic/probabilistic proof of file ownership
CHEN Yue;LI Chao-ling;LAN Ju-long;JIN Kai-chun;WANG Zhong-hui;Faculty of Cyberspace Security;PLA Information Engineering University;State Key Laboratory of Mathematical Engineering and Advanced Computing;PLA 78179 Unit;National Digital Switching System Engineering & Technological R&D Center;
..............page:1-12
Reversible data hiding in encrypted images using recompression
LIU Jiu-fen;HAN Tao;TIAN Yu-guo;LIU Wen-bin;Information Engineering University;State Key Laboratory of Mathematical Engineering and Advanced Computing;State Key Laboratory of Information Security;Institute of Information Engineering;Chinese Academy of Sciences;
..............page:13-25
Timing synchronization algorithm based on clock skew estimation for WSN
SUN Yi;ZENG Lu-kun;WU Xin;LU Jun;SUN Yue;School of Electrical and Electronic Engineering;North China Electric Power University;
..............page:26-33
Data processing based on the privacy-preserving vector for wireless sensor networks
ZENG Wei-ni;LIN Ya-ping;YI Ye-qing;HE Shi-ming;CHEN Peng;The 716th Research Institute;China Shipbuilding Industry Corporation;College of Information Science and Engineering;Hunan University;Department of Information Science and Engineering;Hunan Institute of Humanities Science and Technology;
..............page:34-46
Sparse group LASSO constraint eigenphone speaker adaptation method for speech recognition
QU Dan;ZHANG Wen-lin;Institute of Information System Engineering;PLA Information Engineering University;
..............page:47-54
Dynamic trust model based on recommendation chain classification in complex network environment
ZHANG Lin;XING Huan;WANG Ru-chuan;WU Chao-jie;College of Computer;Nanjing University of Posts and Telecommunications;Institute of Computer Technology;Nanjing University of Posts and Telecommunication;Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks;Key Lab of Broadband Wireless Communication and Sensor Network Technology;Nanjing University of Posts and Telecommunications;Ministry of Education Jiangsu Province;
..............page:55-64
Encrypted traffic classification based on packet length distribution of sampling sequence
GAO Chang-xi;WU Ya-biao;WANG Cong;Postdoctoral Research Station;Beijing University of Posts and Telecommunications;Enterprise Postdoctoral Working Station;Beijing Top Sec Co.;
..............page:65-75
H.265/HEVC frame-level bitrate allocation algorithm considering video content
LI Wei;YANG Fu-zheng;REN Peng;Faculty of Printing;Packaging and Digital Media Technology;Xian University of Technology;Faculty Communication Engineering;Xidian University;
..............page:76-81
New affiliation-hiding authenticated key exchange protocol
WEN Ya-min;GONG Zheng;School of Mathematics and Statistics;Guangdong University of Finance and Economics;Shanghai Key Laboratory of Integrated Administration Technologies for Information Security;School of Computer Science;South China Normal University;State Key Laboratory of Information Security;Institute of Information Engineering;Chinese Academy of Sciences;
..............page:82-90
Three dimensional block-matching video denoising algorithm based on dual-domain filtering
XIAO Jin-sheng;LI Wen-hao;JIANG Hong;PENG Hong;ZHU Shen-tian;School of Electronic Information;Wuhan University;State Key Laboratory of Information Engineering in Surveying;Mapping and Remote Sensing;Wuhan University;
..............page:91-97
Influence and its suppression of desired signal coupling to reference signal to interference cancellation system
JIANG Yun-hao;ZHAO Zhi-hua;Hubei Collaborative Innovation Center for High-efficiency Utilization of Solar Energy;Hubei University of Technology;School of Electrical and Electronic Engineering;Hubei University of Technology;National Key Laboratory for Vessel Integrated Power System Technology;Naval University of Engineering;
..............page:98-108
Improved identity based multi-receiver anonymous signcryption scheme
ZHANG Bo;SUN Tao;YU Dai-rong;School of Information Science and Engineering;University of Jinan;Shandong Provincial Key Laboratory of Network Based Intelligent Computing;Shandong Provincial Key Laboratory of Software Engineering;
..............page:109-118
Attribute-based encryption with hidden policies in the access tree
SONG Yan;HAN Zhen;LIU Feng-mei;LIU Lei;School of Computer and Information Technology;Beijing Jiaotong University;Science and Technology on Information Assurance Laboratory;
..............page:119-126
Loopback matching algorithm with support set protection
TIAN Shu-juan;FAN Xiao-ping;PEI Ting-rui;YANG Shu;LI Zhe-tao;School of Information Science and Engineering;Central South University;College of Information Engineering;Xiangtan University;Laboratory of Networked Systems;Hunan University of Finance and Economics;
..............page:127-134
Alert processing based on attack graph and multi-source analyzing
LIU Wei-xin;ZHENG Kang-feng;WU Bin;YANG Yi-xian;Information Security Centre;Beijing University of Posts and Telecommunications;
..............page:135-144
Privacy preserving based on differential privacy for weighted social networks
LAN Li-hui;JU Shi-guang;School of Computer Science and Telecommunication Engineering;Jiangsu University;School of Information Engineering;Shenyang University;
..............page:145-159
Design of robust constant beamwidth beamformer with maximal sparsity
WU Kai;SU Tao;LI Qiang;HE Xue-hui;National Laboratory of Radar Signal Processing;Xidian University;
..............page:160-168
Method of dynamic integrity measurement for VMM based on adjacency data
WU Tao;YANG Qiu-song;HE Ye-ping;NFS;Institute of Software;Chinese Academy of Sciences;State Key Laboratory of Computer Science;Institute of Software;Chinese Academy of Sciences;University of Chinese Academy of Sciences;
..............page:169-180
Modeling and performance analysis of train communication network based on switched ethernet
ZHANG Yu-zhuo;CAO Yuan;WEN Ying-hong;School of Electronic and Information Engineering;Beijing Jiaotong University;National Engineering Research Center of Rail Traffic Control System;Beijing Jiaotong University;
..............page:181-187
Highly efficient compact verifiable shuffle scheme based on QA-NIZK proof
CHENG Xiao-gang;WANG Jian;CHEN Yong-hong;College of Computer Science and Technology;Nanjing University of Aeronautics and Astronautics;College of Computer Science and Technology;Huaqiao University;
..............page:188-192
Formal modeling and analyzing method for database security policy
WANG Rong;ZHANG Min;FENG Deng-guo;LI Hao;Trusted Computing and Information Assurance Laboratory;Institute of Software;Chinese Academy of Sciences;University of Chinese Academy of Sciences;State Key Laboratory of Computer Science;Institute of Software;Chinese Academy of Sciences;
..............page:193-203
Evolutionary model of heterogeneous clustering wireless sensor networks based on local world theory
FU Xiu-wen;LI Wen-feng;School of Logistics Engineering;Wuhan University of Technology;
..............page:204-214
Power control for successive interference cancellation algorithm based on game theory
HU Song-hua;ZHANG Jian-jun;LU Yang;LIU Bin;HAN Jiang-hong;School of Computer and Information;Hefei University of Technology;School of Electrical Engineering & Automation;Henan Polytechnic University;
..............page:215-221
Rational secret sharing scheme based on Markov decision
TIAN You-liang;WANG Xue-mei;LIU Lin-fang;College of Science;Guizhou University;Guiyang Vocational and Technical College;
..............page:222-229
Research on location privacy in mobile internet
WANG Yu-hang;ZHANG Hong-li;YU Xiang-zhan;Research Center of Computer Network and Information Security Technology;Harbin Institute of Technology;
..............page:230-243
Diagonal space-time coded spatial modulation scheme for two-way relay system
LI Feng;WANG Lei;CHEN Zhi-gang;School of Electronics and Information Engineering;Xi’an Jiaotong University;
..............page:244-251
Q-learning based handoff algorithm for satellite system with ancillary terrestrial component
XIONG Dan-ni;LI Yi;Key Laboratory of Universal Wireless Communications;Ministry of Education;Beijing University of Posts and Telecommunications;
..............page:252-258
Sequential double quantum blind signature protocol
WANG Hui;SHI Run-hua;ZHONG Hong;CUI Jie;ZHANG Shun;WANG Kai-ting;School of Computer Science and Technology;Anhui University;
..............page:259-266