Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Journal of Beijing Electronic Science and Technology Institute
1672-464X
2005 Issue 2
Secret Sharing among Weighted Participants
Mingsheng Wang;Zhuojun Liu;Yanshuo Zhang
..............
page:1-8
Application of Tunneling Technology to Electric Power Communication Management Network
Wu Run-ze;Wang Yun;WEN Ya-Feng
..............
page:9-13
Proxy Signature Scheme Using Self-certified Public Key
Zhang Yi-chen;LI Ji-guo;Tang Ming
..............
page:19-22
Performance Analysis of Convolution Codes in UWB Communication System
Jin Ying;Li Ying;WANG Xin-mei
..............
page:23-26
Digital Watermarking against Counterfeit in Signature Application
WU Xiang-jun;Zhang Chun-e;QIU Zheng-ding
..............
page:27-30
A New Resolution Scheme of WLAN's Security Problem Based on Layer Model
Liu Liang;Liu Yun
..............
page:31-34
On Determining the Type of a Symmetric Key Crypto-algorithm and How to Evaluate Its Security
Ou Hai-wen;Li Feng-hua;YANG Ming-hua
..............
page:35-36,22
General Query Web Groupware Design Based on .NET and MVC Design Pattern
ZHOU Xiao-hui;Tang Jun-she
..............
page:37-40
Technology of Data Mining in Association Rules
Wang Yu-zhen
..............
page:41-43
A Risk Assessment Method Based on AHP and Fuzzy Theory
Nie Xiao-wei;Zhang Yu-qing;Yang Ding-cai
..............
page:44-49
The Performance Simulation of LAS-CDMA System with a Single Cell
Liao Han-cheng
..............
page:50-53
Analysis and Extension of Architecture of AAA Protocol's Implementation
Zhao Yuan-chao;LI Dao-ben
..............
page:54-58
Design of a Remote Monitor and Control System for LAN
CAO Hong-long;Mao Xiao-yan;Cai Wen-feng
..............
page:59-62
The Logic Synthesis Flow for ePro System
Xue Hua-ming;Nie Jan-kun;Gao Feng
..............
page:63-65
The Performance Analysis and Simulation of Soft Handoff of Train in the MIPv6 Network
Sun Wei;Liu Yun
..............
page:66-69
An Improved Image Coding Method for Still Image
Wang Xin-yue;Wang Wen-hua
..............
page:70-73
Game Controller Base on Delphi
Yu Cheng-dan;CHENG Jia-xing
..............
page:74-77
An ARP Attack and Its Safe Strategy
Jiang Hua;Wei Zhan-zhen;YANG Ya-tao
..............
page:78-82,77
Design of Control System of Electric Switch Based on Infrared Electronic Technology
Chen Yu;LIU Zhao-yu;WEN Xin-ling
..............
page:83-85
Survey of Feature Extraction Algorithms in Palmprint Recognition
Wu Jie;QIU Zheng-ding
..............
page:86-92,62
The Development of Computer Architecture and New Technology
Ma Dao-jun;Zhang Jing-huai
..............
page:93-96