| [1] | 
													
														XUE Kaiping, LIU Bin, LI Wei, HONG Peilin. 
														
															A format feature extracting and classifying algorithm for unknown data link frame
														[J]. , 2018, 35(4): 521-528.
													 | 
												
																																																																																
													| [2] | 
													
														LIN Xueyan, LIN Jingqiang, GUAN Le, WANG Lei. 
														
															China standard cryptographic algorithm implementation in virtual desktop system
														[J]. , 2015, 32(5): 701-707.
													 | 
												
																																																																																
													| [3] | 
													
														YU Sheng, SHANG Dezhong, ZHOU Meng, ZHANG Baoxian. 
														
															An adjustable local-flooding-based routing protocol for wireless sensor networks with mobile sink
														[J]. , 2015, 32(2): 273-280.
													 | 
												
																																																																																
													| [4] | 
													
														GUO Guanhua, JIAO Zhenzhen, ZHOU Meng, ZHANG Baoxian. 
														
															A location-based multi-level-neighbor-assisted coding-aware routing protocol for wireless multi-hop networks
														[J]. , 2015, 32(1): 140-144.
													 | 
												
																																																																																
													| [5] | 
													
														JIANG Fukai, LU Hancheng. 
														
															A storage management scheme based on cross-layer packet size optimization in DTN
														[J]. , 2014, 31(6): 836-842.
													 | 
												
																																																																																
													| [6] | 
													
														HUANG Gui-Fang, HU Lei. 
														
															Statistically binding non-interactive non-mallebale commitment
														[J]. , 2013, 30(2): 264-271.
													 | 
												
																																																																																
													| [7] | 
													
														LUO Cheng, ZHANG Yu-Qing, WANG Long, LIU Qi-Xu. 
														
															Automatic network protocol analysis and vulnerability discovery based on symbolic expression
														[J]. , 2013, 30(2): 278-284.
													 | 
												
																																																																																
													| [8] | 
													
														LIU Shu-Ming, LIU Jian-Wei, MAO Jian. 
														
															An improved AODV secure route protocol
														[J]. , 2011, 28(6): 801-805.
													 | 
												
																																																																																
													| [9] | 
													
														HE Wei-Qing, YANG Shou-Bao, TENG Da, HU Yun. 
														
															Cooperation diversity-aware routing metric and cooperative routing protocol for 802.11s-based wireless Mesh networks
														[J]. , 2011, 28(4): 522-530.
													 | 
												
																																																																																
													| [10] | 
													
														ZHANG Zi-Kun, LV Ke-Wei. 
														
															Σ-private private information retrieval protocols
														[J]. , 2011, 28(3): 389-397.
													 | 
												
																																																																																
													| [11] | 
													
														SHAO Xiu-Feng, LI Rong-Hua. 
														
															On the security proof of a protocol for private integer comparison
														[J]. , 2011, 28(2): 262-265.
													 | 
												
																																																																																
													| [12] | 
													
														GUO Chan, HONG Pei-Lin, XUE Kai-Ping. 
														
															An interference-aware multipath routing protocol in IEEE 802.11 wireless mesh networks
														[J]. , 2010, 27(6): 809-817.
													 | 
												
																																																																																
													| [13] | 
													
														HUANG Gui-Fang, HU Lei, LIN Dong-Dai. 
														
															An efficient compiler from Σ-protocol to deniable zero knowledge in CRS model
														[J]. , 2010, 27(6): 831-837.
													 | 
												
																																																																																
													| [14] | 
													
														DING Zhi-Guo, ZHU Xue-Yong, LEI Ying-Ke. 
														
															An RFID authentication protocol based on CDMA and anti-collision function
														[J]. , 2010, 27(3): 397-403.
													 | 
												
																																																																																
													| [15] | 
													
														HU Yun, YANG Shou-Bao, GUO Xiao-Lei, SHEN Qing-Wei. 
														
															Load-balanced routing strategy for Internet-accessing oriented WMN
														[J]. , 2010, 27(2): 234-244.
													 |