[1] |
WANG Jing, CHEN Lan, ZHANG He, WANG Haiyong.
Multi-resource scheduling algorithm based on EDA simulation software
[J]. Journal of University of Chinese Academy of Sciences, 2021, 38(5): 696-701.
|
[2] |
JIA Shijie, XIA Luning, WEN Nan.
Signature private key generation method based on the physical properties of Nand Flash and its applications
[J]. , 2015, 32(5): 695-700.
|
[3] |
ZHANG Yan, ZHANG Liwu, ZHANG Moli.
Efficient attribute-based signature with constant signature size
[J]. , 2015, 32(5): 708-713.
|
[4] |
ZHANG Mingqing, ZHANG Can, CHEN Deyuan, ZHANG Kenan.
A mobile classification security method for SMS based on Android system
[J]. , 2015, 32(2): 281-287.
|
[5] |
JIA Gang-Yong, LI Xi, ZHOU Xue-Hai, ZHU Zong-Wei.
A group management to balance power, performance, and fairness
[J]. Journal of University of Chinese Academy of Sciences, 2013, 30(4): 555-561.
|
[6] |
XU Mao, ZHANG Guang-Rong, CHEN Xiao-Hui, WANG Wei-Dong.
Multi-cell power allocation algorithm for interference coordination based on harmonic mean fairness
[J]. , 2012, 29(5): 659-666.
|
[7] |
HUANG Cao, LIU Fa-Lin.
An explicit TCP method for LEO satellite networks
[J]. , 2012, 29(1): 76-80.
|
[8] |
ZHANG En, CAI Yong-Quan.
A verifiable rational secret sharing scheme based on the elliptic curve
[J]. , 2011, 28(6): 806-810.
|
[9] |
MA Yun-Qi, LU Han-Cheng.
Optimal scheduling algorithm based on network coding in vehicular networks
[J]. , 2010, 27(5): 677-683.
|
[10] |
GUO Li-Feng, LI Yong, HU Lei.
Cryptanalysis of a signature scheme without using one-way Hash functions
[J]. Journal of University of Chinese Academy of Sciences, 2008, 25(5): 698-700.
|
[11] |
ZHANG Lei, YANG Shou-Bao, WANG Da-Peng, SUN Wei-Feng.
Modeling and analyzing of TCP fairness in wireless mesh network
[J]. , 2007, 24(3): 342-350.
|
[12] |
ZHOU Su-Jing, LIN Dong-Dai.
Comments on an efficient group signature scheme
[J]. , 2007, 24(3): 316-319.
|
[13] |
LUO Wen-Jun, LONG Shi-Gong.
Security Analysis and Improvement of a Message Recovery Signature Scheme
[J]. , 2005, 22(2): 197-201.
|
[14] |
.
A Survey of Digital Fingerprinting
[J]. , 2004, 21(3): 289-298.
|
[15] |
Shi Yi .
DESIGN AND ANALYSIS OF A NEW GROUP OF (t_j, t, n) THRESHOLD GROUP- SIGNATURE SCHEME
[J]. , 2001, 18(2): 110-113.
|