Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal on Communications
1000-436X
2014 Issue 11
Survey on security and privacy preserving for mobile internet service
LI Hui;LI Feng-hua;CAO Jin;NIU Ben;SUN Wen-hai;GENG Kui;State Key Laboratory of Integrated Service Networks;Xidian University;State Key Laboratory of Information Security;Institute of Information Engineering;CAS;
..............page:1-11
Identifying method for opinion leaders in social network based on competency model
CHEN Bo;TANG Xiang-yan;YU Ling;LIU Ya-shang;School of Computer Science;Nanjing Normal University;Jiangsu Provincial Key Laboratory for Numerical Simulation of Large Scale Complex Systems;
..............page:12-22
Composable information flow verification for service chain based on model checking
XI Ning;MA Jian-feng;SUN Cong;LU Di;ZHANG Tao;School of Computer Science and Technology;Xidian University;
..............page:23-31
Research on cloud-based traffic adaptive command and control method for mobile botnet
CHEN Wei;ZHOU Shi-wen;YIN Cheng-yu;School of Computer;Nanjing University of Posts and Telecommunications;
..............page:32-38
Trust-aware dynamic level scheduling algorithm in cloud environment
CAO Jie;ZENG Guo-sun;JIANG Huo-wen;MA Hai-ying;Department of Computer Science and Technology;Tongji University;Tongji Branch;National Engineering & Technology Center of High Performance Computer;College of Computer Science and Technology;Nantong University;
..............page:39-49
Game theory based trust management method for mobile ad hoc networks
GUO Jing-jing;MA Jian-feng;LI Qi;WAN Tao;GAO Cong;ZHANG Liang;School of Computer;Xidian University;Science and Technology on Communication Information Security Control Laboratory;School of Information Engineering;East China Jiaotong University;
..............page:50-58
Joint power control for untrusted relay cooperation-based confidential communication
FENG Wen-jiang;JIANG Wei-heng;DENG Yi-na;YUAN Yang;College of Communication Engineering;Chongqing University;
..............page:59-68+80
Secure and high throughput routing protocol with QoS constraints in cognitive wireless Mesh networks
KUANG Zhu-fang;CHEN Zhi-gang;WANG Guo-jun;LIU Hui;School of Computer and Information Engineering;Central South University of Forestry & Technology;School of Software;Central South University;Department of Computer Science;Missouri State University;
..............page:69-80
Artificial noise aided secure beamforming for multi-antenna relay systems
ZHANG Li-jian;JIN Liang;LIU Lu;LUO Wen-yu;China National Digital Switching System Engineering and Technological R&D Center;
..............page:81-88
Coordinated beamforming for cognitive multi-cell networks with wiretap channels
CHEN Dong-hua;ZHANG Xiu-xiu;XIE Wei-bo;College of Information Science and Engineering;Huaqiao University;College of Computer Science and Technology;Huaqiao University;
..............page:89-95
Network isolation communication scheme to resist against covert channel
LI Feng-hua;TAN Miao-miao;FAN Kai;GENG Kui;ZHAO Fu;State Key Laboratory of Information Security;Institute of Information Engineering;Chinese Academy of Science;School of Telecommunication Engineering;Xidian University;Beijing Aerospace Numerical Control System Co.;Ltd;
..............page:96-106
GUC-secure protocol for private relational join operator computing
TIAN Yuan;SUN Rong-xin;CAI Wu-yang;Software School;Dalian University of Technology;
..............page:107-116
SAT-based lazy formal analysis method for security protocols
GU Chun-xiang;WANG Huan-xiao;ZHENG Yong-hui;XIN Dan;LIU Nan;Institute for Network Security;PLA Information Engineering University;State Key Laboratory of Mathematical Engineering and Advanced Computing;
..............page:117-125
Provably secure and efficient certificateless sequential multi-signature scheme in random oracle model
XU Yan;HUANG Liu-sheng;TIAN Miao-miao;ZHONG Hong;School of Computer Science and Technology;University of Science and Technology of China;Modern Educational and Technology Center;Anhui University;School of Computer Science and Technology;Anhui University;
..............page:126-131
Edwards curves based security authentication protocol for mobile RFID systems
YANG Yu-long;PENG Chang-gen;ZHOU Zhou;ZHANG Xiao-pei;College of Computer Science & Information;Guizhou University;Institute of Cryptography & Data Security;Guizhou University;College of Science;Guizhou University;
..............page:132-138+145
New secure distributed secret sharing scheme of n product
CHEN Zhen-hua;LI Shun-dong;WANG Bao-cang;LI Ji-liang;LIU Xin;School of Computer Science;Shanxi Normal University;School of Computer Science and Technology;Xi’an University of Science and Technology;State Key Laboratory of Integrated Service Network;Xidian University;
..............page:139-145
New remote authorization protocol for vehicle diagnosis
JIAO Zheng-da;MA Jian-feng;SUN Cong;YAO Qing-song;School of Computer Science and Technology;Xidian University;
..............page:146-153
Design of secure privacy-preserving data aggregation scheme for wireless sensor network
ZHAO Xiao-min;LIANG Xue-li;JIANG Shuang-shuang;CHEN Qing-zhang;College of Computer Science & Technology;Zhejiang University of Technology;
..............page:154-161
Location privacy-preserving method of k-anonymous based on service similarity
YE A-yong;LI Ya-cheng;MA Jian-feng;XU Li;Key Lab of Network Security and Cryptology;Fujian Normal University;School of Computer Science and Technology;Xidian University;
..............page:162-169
Image watermarking algorithm against attacks based on SIFT feature point and cross-ratio value
ZHANG Jin-li;LI Min;HE Yu-jie;College of Primary Command;Second Artillery Engineering University;Department of Information Engineering;Chinese Armed Police Force Engineering University;
..............page:170-181
KAP: location privacy-preserving approach in location services
WANG Yu-hang;ZHANG Hong-li;YU Xiang-zhan;Research Center of Computer Network and Information Security Technology;Harbin Institute of Technology;
..............page:182-190
Anonymization algorithm based on time density for data stream
XIE Jing;ZHANG Jian-pei;YANG Jing;ZHANG Bing;College of Computer Science and Technology;Harbin Engineering University;
..............page:191-198