Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal on Communications
1000-436X
2015 Issue S1
Collaboration coding to multi-node repair program under the twin-MDS codes framework in cloud storage systems
XIE Xian-zhong;HUANG Qian;WANG Liu-su;Institute of Broadband Access Technologies;Chongqing University of Posts and Telecommunications;Department of Computer Science;College Mobile Telecommunications;Chongqing University of Posts and Telecommunications;
..............page:1-8
Content popularity difference-aware cache eviction scheme for CDN-P2P hybrid networks
NIE Hua;ZHANG Min;GUO Jing-rong;YANG Xiao-long;School of Computer and Communications Engineering;Beijing University of Science and Technology;
..............page:9-15
Research on safety methods of airborne embedded software
LI Ya-hui;ZHANG Ya-di;GUO Peng;Airborne and Missile-borne Computer Aviation technology Key Lab;Aeronautical Computing Technique Research Institute;
..............page:16-21
Congestion control mechanism based on data delivery probability in DTN data dissemination network
XIA Yi;DENG Guang-hong;Institute of Traffic Information;Hubei Communications Technical College;Department of Scientific Research on System;Wuhan Digital Engineering Institute;
..............page:22-29
Location fingerprint optimization based access point deployment in indoor WLAN localization
ZHOU Mu;PU Qiao-lin;TIAN Zeng-shan;Chongqing Key Lab of Mobile Communications Technology;Chongqing University of Posts and Telecommunications;
..............page:30-41
Secure supply and demand relationship perception routing in intermittently connected wireless networks
YANG Peng;TANG Yang;SHU Na;WANG Ru-yan;Broadband Ubiquitous Network Laboratory;Chongqing University of Posts and Telecommunications;China Academy of Telecommunications Research;
..............page:42-52
Research of malicious nodes identification based on DPAM-DM algorithm for WSN
ZHANG Lin;YIN Na;WANG Ru-chuan;College of Computer;Nanjing University of Posts and Telecommunications;Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks;Institute of Computer Technology;Nanjing University of posts and Telecom Mutilations;Key Lab of Broadband Wireless Communication and Sensor Network Technology;Ministry of Education;Nanjing University of Posts and Telecommunications;
..............page:53-59
GHSOM intrusion detection based on Dempster-Shafer theory
SU Jie;DONG Wei-wei;XU Xuan;LIU Shuai;XIE Li-peng;School of Computer Science and Technology;Harbin University of Science and Technology;
..............page:60-64
Security authentication protocol for RFID based on PRESENT algorithm
ZHANG Xing;HAN Dong;CAO Guang-hui;JIA Xu;School of Electronics and Information Engineering;Liaoning University of Technology;
..............page:65-74
Analysis on VANET routing protocols
WU Zhen-hua;HU Peng;School of Software;Nanchang Hangkong University;
..............page:75-84
Research on second-order SQL injection techniques
LE De-guang;LI Xin;GONG Sheng-rong;ZHENG Li-xin;Scholl of Computer Science & Engineering;Changshu Institute of Technology;College of Engineering;Huaqiao University;
..............page:85-93
Uncertain trajectory privacy-preserving method of moving object
WANG Shuang;ZHOU Fu-cai;WU Li-na;Software College;Northeastern University;
..............page:94-102
Fault diagnosis and restoration strategy based on Voronoi diagram and resolving set
WANG Xiao-ding;XU Li;ZHOU Shu-ming;LIN Hui;Key Lab of Network Security and Cryptography;Fujian Normal University;
..............page:103-109
QoS modeling and evaluation of mobile application service based on scene
HU Yan-zhi;ZHANG Feng-bin;GAN Zhi-chun;TIAN Tian;YIN Cai-hua;The Second Deportment;National Defense Information Academy;The Second Deportment;Chongqing Communication College;
..............page:110-117
Design and implementation of a model for OS kernel integrity protection
TIAN Dong-hai;CHEN Jun-hua;JIA Xiao-qi;HU Chang-zhen;Beijing Key Laboratory of Software Security Engineering Technology;Beijing Institute of Technology;Key Laboratory of IDT Application Technology of Universities in Yunnam Province;Yunnam Minzu University;State Key Laboratory of Information Security;Institute of Information Engineering;Chinese Academy of Sciences;
..............page:118-125
Clustering-based dynamic privacy preserving method for social networks
GU Yong-hao;LIN Jiu-chuan;GUO Da;Beijing Key Laboratory of Intelligent Telecommunications software and Multimedia;School of Computer Science;Beijing University of Posts and Telecommunications;The Third Research Institute of Ministry of Public Security;School of Electronic Engineering;Beijing University of Posts and Telecommunications;
..............page:126-130
Mutual information power analysis attack in the frequency domain of the crypto chip
WANG Min;WU Zhen;RAO Jin-tao;DU Zhi-bo;College of Information Security Engineering;Chengdu University of Information Technology;
..............page:131-135
Security sharing and associated deleting scheme for multi-replica in cloud
XIONG Jin-bo;SHEN Wei-wei;HUANG Yang-qun;YAO Zhi-qiang;Faculty of Software;Fujian Normal University;
..............page:136-140
Efficient segment pattern based method for malicious URL detection
LIN Hai-lun;LI Yan;WANG Wei-ping;YUE Yin-liang;LIN Zheng;Institute of Information Engineering;Chinese Academy of Sciences;National Computer Network Emergency Response and Coordination Center;
..............page:141-148
Research and implementation of intelligent terminal lightweight face recognition system
MA Guo-jun;ZHOU Hai-dong;School of Information Engineering;Xi’an University;School of Telecommunications Engineering;Xidian University;
..............page:149-156
Bayes decision theory based risk minimization authorization mapping
ZHAO Bin;HE Jing-sha;School of Software Engineering;Beijing University of Technology;Department of Computer Science;Jining University;
..............page:157-161
RIM-MAC: a receiver initiated multi-session MAC protocol for underwater acoustic networks
LI Chao;XU Yong-jun;DIAO Bo-yu;WANG Feng;WANG Qi;Institute of Computing Technology;Chinese Academy of Science;University of Chinese Academy of Sciences;Naval Academy of Armament;
..............page:162-170
Time synchronization method for wireless sensor networks based on mobile reference nodes
ZHANG Yu-qiang;HE Jing-sha;XU Jing;ZHAO Bin;CAI Fang-bo;College of Computer Science;Beijing University of Technology;School of Software Engineering;Beijing University of Technology;Department of Computer Science;Jining University;
..............page:171-180
SC-CFDMA uplink symbol synchronization method based on multi-rate satellite-ground loop
DING Dan;CHENG Nai-ping;LIAO Yu-rong;Department of Optical and Electronic Equipment;Academy of Equipment;
..............page:181-187
SDFAC: software defined flow access control mechanism
WANG Xiu-lei;ZHANG Guo-min;HU Chao;CHEN Ming;WEI Xiang-lin;College of Command Information System;PLA University of Science and Technology;
..............page:188-196
Large-scale log compressing system based on differential compression
TANG Qiu;JIANG Lei;DAI Qiong;National Engineering Laboratory for Information Security Technologies;Institute of Information Engineering;Chinese Academy of Sciences;University of Chinese Academy of Sciences;
..............page:197-202
Friends mechanism-based routing intrusion detection model for mobile ad hoc network
XIAO Yang;BAI Lei;WANG Xian;School of Telecommunication Engineering;Xidian University;
..............page:203-214
Approach to weak signal extraction and detection via sparse representation
TANG Ya-fei;ZHANG Yun-yong;GUO Zhi-bin;China Unicom Research Institute;
..............page:215-223
Survey on vertical handoff in heterogeneous wireless networks
WANG Yu-wei;LIU Min;FANG Bing-yi;Institute of Computing Technology;Chinese Academy of Sciences;University of Chinese Academy of Sciences;China Unicom Research Institute;
..............page:224-234
New attack based on smartwatch motion sensors and the protection method research
SONG Chen-guang;LIU Jian-wei;WU Qian-hong;GUAN Zhen-yu;School of Electronics and Information Engineering;Beihang University;
..............page:235-242
Privacy protection method on time-series data publication
YU Dong;KANG Hai-yan;School of Information Management;Beijing Information Science and Technology University;
..............page:243-249
Naval fleet across-domain communication scheme based on CP-ABE
GUO Wei;ZHOU Xue-guang;QU Cheng-qin;LUO Fang;JI Xiang-jun;Department of Information Security;Naval University of Engineering;Naval Institute of Computing Technology;
..............page:250-258
Application of keyword searchable encryption in cloud
LIN Peng;JIANG Jie;CHEN Tie-ming;Institute of Computer;Technology of Zhejiang University;
..............page:259-265
Adjusted automata learning algorithm for security protocol adaptive model checking
YANG Jing;FAN Dan;ZHANG Yu-qing;Information Security Research Center of State Key Laboratory of Integrated Services Networks;Xidian University;National Computer Network Intrusion Protection Center;University of Chinese Academy of Sciences;State Key Laboratory of Information Security Institute of Information Engineering;Chinese Academy of Sciences;
..............page:266-276