Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal on Communications
1000-436X
2016 Issue 6
Study of energy efficient WBAN topology optimization in IEEE 802.15.6
LIANG Zheng-you;YAO Yu-mei;School of Computer and Electronic Information;Guangxi University;Guangxi Key Laboratory Cultivating Base of Multimedia Communications and Network Technology;Guangxi University;
..............page:1-10
Research on Webshell-based botnet
LI Ke;FANG Bin-xing;CUI Xiang;LIU Qi-xu;YAN Zhi-tao;School of Computer;Beijing University of Posts and Telecommunications;Institute of Information Engineering;Chinese Academy of Sciences;
..............page:11-19
Certificateless strong designated verifier multi-signature
DU Hong-zhen;WEN Qiao-yan;School of Mathematics and Information Science;Baoji University of Arts and Sciences;State Key Laboratory of Networking and Switching Technology;Beijing University of Posts and Telecommunications;
..............page:20-28
Discrete multi-objective optimization of particle swarm optimizer algorithm for multi-agents collaborative planning
SHI Xiao-bo;ZHANG Yin;ZHAO Shan;XIAO Deng-ming;College of Computer and Information Engineering;Henan Normal University;School of Computer Science and Technology;Huazhong University of Science and Technology;Engineering Lab of Intelligence Business & Internet of Things;Henan Province;School of Information and Safety Engineering;Zhongnan University of Economics and Law;
..............page:29-37
Network status aware routing in content-centric network
CAI Yue-ping;LIU Jun;College of Communication Engineering;Chongqing University;
..............page:38-48
ID-based server-aided verification signature scheme with strong unforgeability
YANG Xiao-dong;YANG Miao-miao;GAO Guo-juan;LI Ya-nan;LU Xiao-yong;WANG Cai-fen;College of Computer Science and Engineering;Northwest Normal University;
..............page:49-55
Method of constructing an anonymous graph based on information loss estimation
SU Jie;LIU Shuai;LUO Zhi-yong;SUN Guang-lu;School of Computer Science and Technology;Harbin University of Science and Technology;
..............page:56-64
Online hierarchical reinforcement learning based on interrupting Option
ZHU Fei;XU Zhi-peng;LIU Quan;FU Yu-chen;WANG Hui;School of Computer Science and Technology;Soochow University;Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education;Jilin University;
..............page:65-74
Monitoring approach for online security of cryptographic protocol
ZHU Yu-na;HAN Ji-hong;YUAN Lin;FAN Yu-dan;CHEN Han-tuo;GU Wen;The Third College;PLA Information Engineering University;Troops 91033 of PLA;
..............page:75-85
Quantitative approach of multi-controller’s consensus in SDN
LI Jun-fei;LAN Ju-long;HU Yu-xiang;WU Jiang-xing;National Digital Switching System Engineering & Technological R&D Center;
..............page:86-93
Network model and topology control algorithm based on hierarchical autonomous system in space information network
ZHANG Wei;ZHANG Geng-xin;BIAN Dong-ming;GOU Liang;XIE Zhi-dong;College of Communication Engineering;PLA University of Science and Technology;
..............page:94-105
Time and energy aware virtual network embedding using Bayesian theory analysis
HU Ying;ZHUANG Lei;CHEN Hong-chang;MA Ding;School of Information Engineering;Zhengzhou University;National Digital Switching System Engineering & Technological R&D Center;College of Information Science and Engineering;Henan University of Technology;
..............page:106-118
Method for determining the lengths of protocol keywords based on maximum likelihood probability
LUO Jian-zhen;YU Shun-zheng;CAI Jun;School of Electronic and Information;Guangdong Polytechnic Normal University;School of Information Science and Technology;Sun Yat-Sen University;
..............page:119-128
Efficient certificateless multi-receiver anonymous signcryption scheme
QIN Yan-lin;WU Xiao-ping;HU Wei;Department of Information Security;Naval University of Engineering;
..............page:129-136
Graph partition based mapping algorithm on multiprocessors for streaming applications
TANG Qi;WU Shang-feng;SHI Jun-wu;WEI Ji-bo;College of Electronic Science and Engineering;National University of Defense Technology;
..............page:137-143
Routing algorithm based on characteristics analysis of vehicle trace in vehicular ad hoc network
TAO Hua;FENG Fu-qin;XIAO Peng;TAN Cheng-wei;TAO Jun;School of Computer Science and Engineering;Southeast University;Key Laboratory of Computer Network and Information Integration;MOE;Southeast University;
..............page:144-153
User social influence analysis based on constrained nonnegative tensor factorization
WEI Jing-jing;CHEN Chang;LIAO Xiang-wen;CHEN Guo-long;CHENG Xue-qi;College of Physics and Information Engineering;Fuzhou University;College of Electronics and Information Science;Fujian Jiangxia University;College of Mathematics and Computer Science;Fuzhou University;Fujian Provincial Key Laboratory of Networking Computing and Intelligent Information Processing;Fuzhou University;Institute of Computing Technology;Chinese Academy of Sciences;
..............page:154-162
Optimal forwarding policy in opportunistic based on social features of nodes
WANG Zhi-fei;SHI Pei-teng;DENG Su;HUANG Hong-bin;WU Ya-hui;Science and Technology on Information Systems Engineering Laboratory;National University of Defense Technology;
..............page:163-168
Survey of security for Android smart terminal
XU Yan-ping;MA Zhao-feng;WANG Zhong-hua;NIU Xin-xin;YANG Yi-xian;Information Security Center;Beijing University of Posts and Telecommunications;National Computer Network Emergency Response Technical Team;Coordination Center of China;
..............page:169-184
Research on linear approximations of simplified Trivium
MA Meng;ZHAO Ya-qun;State Key Lab of Mathematical Engineering and Advanced Computing;Information Engineering University;
..............page:185-191
Adaptive steganography algorithm in digital image based on Arnold transform
LI Qi;LIAO Xin;QU Guo-qing;CHEN Guo-yong;DU Jiao;College of Computer Science and Electronic Engineering;Hunan University;Institute of Software Chinese Academy of Sciences;Institute of Information Engineering Chinese Academy of Sciences;Software Institute;Nanjing University;College of Mathematics and Information Science;Henan Normal University;
..............page:192-198