Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Journal on Communications
1000-436X
2010 Issue 1
Video watermarking algorithm for resisting collusion attacks
liu shao hui ; han lu ; yao hong xun
..............
page:14-19
VLSI implementation of AES algorithm against differential power attack and differential fault attack
han jun ; zeng xiao yang ; zhao jia
..............
page:20-29
Resource allocation for multi-conductor power-cable carrier communications systems
xu zhi qiang ; di ming yue ; zhao yu ming
..............
page:51-58
Generation mechanisms for data gathering-enabling wireless sensor network structure
qin jian cun ; chen chang jia ; gu yu
..............
page:105-111
Energy hole avoid by alternately working with different cluster-radius for wireless sensor networks
liu an feng ; yang guo jun ; chen zhi gang
..............
page:1-8
Synchronization scheme using four-dimensional chaotic system for OFDM
tang liang rui ; zuo zuo ; cui wei xin
..............
page:73-79,84
SER performance analysis of single carrier block transmission systems with zero-forcing equalization
fang chao zuo ; zuo jia zuo ; wang zong xin
..............
page:80-84
The research of the promotion for ECDSA algorithm based on Montgomery-form ECC
wang chao ; shi xiang yong ; niu zhi hua
..............
page:9-13
Fuzzy reasoning model for analysis of program maliciousness
fu wen ; wei bo ; zhao rong cai ; pang jian min
..............
page:44-50
Key management scheme without secure channel for ad hoc networks
li hui xian ; pang liao jun ; wang yu min
..............
page:112-117
Approach to master-slave workflow system and its Petri-net modeling
lu han hua ; zuo li juan ; wang ya shi
..............
page:92-99
Provably secure partially blind signature without trusted PKG
feng tao ; peng wei ; ma jian feng
..............
page:128-134
CPCNN and its application to multiple constrained QoS route
nie ren can ; zhou dong ming ; zhao dong feng ; tan ying fang
..............
page:65-72
Efficient method of constructing parameters in R-ate paring
li bin ; wang xin mei
..............
page:118-121
Joint linear transceiver design over MIMO frequency selective channels
han sheng qian ; yang chen yang
..............
page:30-36
Concatenated space-time block coding with asymmetric MPSK TCM
ao ; ma chun bo ; ao fa liang ; liao gui sheng
..............
page:100-104
Design scheme of linear dispersive space-time codes for downlink muitiuser MIMO systems
zhou meng ; zhang can
..............
page:135-140
Model checking of trusted cryptographic module
chen xiao feng ; feng deng guo
..............
page:59-64,72
Design and implementation of the information model of a P2P-based network management system
wang ruo ; zhang hui ; yang jia hai ; huang gui fen
..............
page:85-91
Attack on a kind of filter generator
yu kun ; qi wen feng
..............
page:122-127
Based on pair-wise balanced design key pre-distribution scheme for heterogeneous wireless sensor networks
ma chun guang ; zhang bing zheng ; sun yuan ; wang hui qiang
..............
page:37-43