Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
ZTE Communications
1009-6868
2016 Issue 1
zhuan ti wang luo kong jian an quan
yang yi xian ;, yang geng ;
..............
page:1-1
Development Prospects of ICT Core Components
LIErping;
..............
page:2-4
Challenges and Countermeasures of Network Space Security
ZHOUYansen;,ZHOULinna;
..............
page:5-9
Security Architecture and Key Techniques of Cyberspace
ZHANGYinghui;,Z HENGDong;,MAChunguang;
..............
page:10-13,18
Security Technology of Big Data in the Cloud Era
YANGXi;,LUOPing;
..............
page:14-18
Data Oriented Security Architecture
MIAOFang;
..............
page:19-22
Research and Application of Secure Multi-Party Computation
ZHANGJuanmei;,XURonghua;
..............
page:23-25
The Development and Applications of Homomorphic Encryption
GONGLinming;,LIShundong;,GUOYimin;
..............
page:26-29
Computer Network Forensics and Investigation
KPCHOW;,CHENHang;,XUFei;
..............
page:30-33
Proactive Security Defense of Dynamic Network
WUChunming;
..............
page:34-37
The General Theory of Security:Meridian
YANGYixian;,NIUXinxin;
..............
page:38-41
Development Trend of Power System for ICT Equipment
HUXianhong;
..............
page:42-45
The Location Aided Routing Protocol in an Aircraft MANET
SHIYan;,YANGPeng;
..............
page:46-49
TCO Analysis for Wireless Core Network
SHITingxiang;,TIANHuiqin;
..............
page:50-53
VoLTE Network Interworking Based on Number Portability
MIAOYongsheng;,NIMing;
..............
page:54-58
Search Space Compute and Error Analysis of A-Beidou Acquisition Technology
XIEQijun;,CHENXin;,LIUPeilin;
..............
page:59-62