Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Journal on Communications
1000-436X
2010 Issue 3
New signcryption algorithm for secure communication of ad hoc networks
zhang chuan rong ; zhang yu qing ; li fa gen ; xiao hong
..............
page:19-24
Identity-based authentication localization scheme for wireless sensor network
huang xiao ; cheng hong bing ; yang geng
..............
page:115-122
Quasi-orthogonal polarization space time block codes with signal constellations rotation and performance analysis
li zheng quan ; shen lian feng ; wang jing jing
..............
page:12-18
Maximum lifetime routing in data aggregated wireless sensor networks with multiple sinks
tang wei ; guo wei
..............
page:37-44
Analysis of chopping stabilizing zero for adaptive interference cancellation system
jiang yun zuo ; ma wei ming ; zhao zhi hua
..............
page:65-74
Security model for ID-based key exchange
liu wen ju ; zhang jun wei ; ma jian feng ; yang chao ; li xing hua
..............
page:89-94
Outage probability for cooperative communication system with asymmetric channel
zuo gang ; liu sheng ; wen xiao jun
..............
page:102-108
Survivability strategy with conditional risk disjunction degree in multi-domain optical networks
zhao ji hong ; qu zuo ; wang li ; mao hong bao
..............
page:126-132
Intrusion detection method based on hierarchical hidden Markov model and variable-length semantic pattern
duan xue tao ; jia chun fu ; liu chun bo
..............
page:109-114
Dynamic self-configuration of user QoS oriented to cognitive network
feng guang sheng ; wang hui qiang ; ma chun guang ; li bing yang ; zhao zuo
..............
page:133-140
MDR codes and self-dual codes on Cartesian product codes
liu xiu sheng
..............
page:123-125
Research of fast decoding for longer constraint length convolutional codes
huang xiao ling ; yang hua long
..............
page:57-64
Availability based trust evaluation model for MANET
zhao zuo bin ; you zhi yang ; zhao zhi feng
..............
page:82-88
Novel scheduling algorithm for TD-HSDPA systems
cui jie ; chang yong yu ; liu shu hui ; yang da cheng
..............
page:75-81
Publicly verifiable public key encryption scheme with short keys
cui yong gang ; liu yu jun
..............
page:45-50
Steganalysis of LSB matching based on regional correlation
chen ming ; zhang ru ; liu fan fan ; wu jia ; niu xin xin
..............
page:1-11
Multi-keyword partial matching algorithm based on text fragments
liao wei ; zou wei
..............
page:31-36,44
New location aware clustering algorithm
tian zuo ; yang zhen
..............
page:25-30
Improved HMM model based method for detecting cyber attacks
yang xiao feng ; sun ming ming ; hu xue lei ; yang jing yu
..............
page:95-101
Analysis and improvement of a password-based authenticated key exchange protocol
shu jian ; xu chun xiang
..............
page:51-56