Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal on Communications
1000-436X
2010 Issue 1
Video watermarking algorithm for resisting collusion attacks
liu shao hui ; han lu ; yao hong xun
..............page:14-19
Resource allocation for multi-conductor power-cable carrier communications systems
xu zhi qiang ; di ming yue ; zhao yu ming
..............page:51-58
Generation mechanisms for data gathering-enabling wireless sensor network structure
qin jian cun ; chen chang jia ; gu yu
..............page:105-111
Energy hole avoid by alternately working with different cluster-radius for wireless sensor networks
liu an feng ; yang guo jun ; chen zhi gang
..............page:1-8
Synchronization scheme using four-dimensional chaotic system for OFDM
tang liang rui ; zuo zuo ; cui wei xin
..............page:73-79,84
SER performance analysis of single carrier block transmission systems with zero-forcing equalization
fang chao zuo ; zuo jia zuo ; wang zong xin
..............page:80-84
The research of the promotion for ECDSA algorithm based on Montgomery-form ECC
wang chao ; shi xiang yong ; niu zhi hua
..............page:9-13
Fuzzy reasoning model for analysis of program maliciousness
fu wen ; wei bo ; zhao rong cai ; pang jian min
..............page:44-50
Key management scheme without secure channel for ad hoc networks
li hui xian ; pang liao jun ; wang yu min
..............page:112-117
Approach to master-slave workflow system and its Petri-net modeling
lu han hua ; zuo li juan ; wang ya shi
..............page:92-99
Provably secure partially blind signature without trusted PKG
feng tao ; peng wei ; ma jian feng
..............page:128-134
CPCNN and its application to multiple constrained QoS route
nie ren can ; zhou dong ming ; zhao dong feng ; tan ying fang
..............page:65-72
Efficient method of constructing parameters in R-ate paring
li bin ; wang xin mei
..............page:118-121
Joint linear transceiver design over MIMO frequency selective channels
han sheng qian ; yang chen yang
..............page:30-36
Concatenated space-time block coding with asymmetric MPSK TCM
ao ; ma chun bo ; ao fa liang ; liao gui sheng
..............page:100-104
Model checking of trusted cryptographic module
chen xiao feng ; feng deng guo
..............page:59-64,72
Design and implementation of the information model of a P2P-based network management system
wang ruo ; zhang hui ; yang jia hai ; huang gui fen
..............page:85-91
Attack on a kind of filter generator
yu kun ; qi wen feng
..............page:122-127
Based on pair-wise balanced design key pre-distribution scheme for heterogeneous wireless sensor networks
ma chun guang ; zhang bing zheng ; sun yuan ; wang hui qiang
..............page:37-43