Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
ZTE Communications
1009-6868
2016 Issue 1
zhuan ti wang luo kong jian an quan
yang yi xian ;, yang geng ;
..............page:1-1
Development Prospects of ICT Core Components
LIErping;
..............page:2-4
Challenges and Countermeasures of Network Space Security
ZHOUYansen;,ZHOULinna;
..............page:5-9
Security Architecture and Key Techniques of Cyberspace
ZHANGYinghui;,Z HENGDong;,MAChunguang;
..............page:10-13,18
Security Technology of Big Data in the Cloud Era
YANGXi;,LUOPing;
..............page:14-18
Data Oriented Security Architecture
MIAOFang;
..............page:19-22
Research and Application of Secure Multi-Party Computation
ZHANGJuanmei;,XURonghua;
..............page:23-25
The Development and Applications of Homomorphic Encryption
GONGLinming;,LIShundong;,GUOYimin;
..............page:26-29
Computer Network Forensics and Investigation
KPCHOW;,CHENHang;,XUFei;
..............page:30-33
Proactive Security Defense of Dynamic Network
WUChunming;
..............page:34-37
The General Theory of Security:Meridian
YANGYixian;,NIUXinxin;
..............page:38-41
Development Trend of Power System for ICT Equipment
HUXianhong;
..............page:42-45
The Location Aided Routing Protocol in an Aircraft MANET
SHIYan;,YANGPeng;
..............page:46-49
TCO Analysis for Wireless Core Network
SHITingxiang;,TIANHuiqin;
..............page:50-53
VoLTE Network Interworking Based on Number Portability
MIAOYongsheng;,NIMing;
..............page:54-58
Search Space Compute and Error Analysis of A-Beidou Acquisition Technology
XIEQijun;,CHENXin;,LIUPeilin;
..............page:59-62