[1] |
XUE Kaiping, LIU Bin, LI Wei, HONG Peilin.
A format feature extracting and classifying algorithm for unknown data link frame
[J]. , 2018, 35(4): 521-528.
|
[2] |
LIN Xueyan, LIN Jingqiang, GUAN Le, WANG Lei.
China standard cryptographic algorithm implementation in virtual desktop system
[J]. , 2015, 32(5): 701-707.
|
[3] |
YU Sheng, SHANG Dezhong, ZHOU Meng, ZHANG Baoxian.
An adjustable local-flooding-based routing protocol for wireless sensor networks with mobile sink
[J]. , 2015, 32(2): 273-280.
|
[4] |
GUO Guanhua, JIAO Zhenzhen, ZHOU Meng, ZHANG Baoxian.
A location-based multi-level-neighbor-assisted coding-aware routing protocol for wireless multi-hop networks
[J]. , 2015, 32(1): 140-144.
|
[5] |
JIANG Fukai, LU Hancheng.
A storage management scheme based on cross-layer packet size optimization in DTN
[J]. , 2014, 31(6): 836-842.
|
[6] |
HUANG Gui-Fang, HU Lei.
Statistically binding non-interactive non-mallebale commitment
[J]. , 2013, 30(2): 264-271.
|
[7] |
LUO Cheng, ZHANG Yu-Qing, WANG Long, LIU Qi-Xu.
Automatic network protocol analysis and vulnerability discovery based on symbolic expression
[J]. , 2013, 30(2): 278-284.
|
[8] |
LIU Shu-Ming, LIU Jian-Wei, MAO Jian.
An improved AODV secure route protocol
[J]. , 2011, 28(6): 801-805.
|
[9] |
HE Wei-Qing, YANG Shou-Bao, TENG Da, HU Yun.
Cooperation diversity-aware routing metric and cooperative routing protocol for 802.11s-based wireless Mesh networks
[J]. , 2011, 28(4): 522-530.
|
[10] |
ZHANG Zi-Kun, LV Ke-Wei.
Σ-private private information retrieval protocols
[J]. , 2011, 28(3): 389-397.
|
[11] |
SHAO Xiu-Feng, LI Rong-Hua.
On the security proof of a protocol for private integer comparison
[J]. , 2011, 28(2): 262-265.
|
[12] |
GUO Chan, HONG Pei-Lin, XUE Kai-Ping.
An interference-aware multipath routing protocol in IEEE 802.11 wireless mesh networks
[J]. , 2010, 27(6): 809-817.
|
[13] |
HUANG Gui-Fang, HU Lei, LIN Dong-Dai.
An efficient compiler from Σ-protocol to deniable zero knowledge in CRS model
[J]. , 2010, 27(6): 831-837.
|
[14] |
DING Zhi-Guo, ZHU Xue-Yong, LEI Ying-Ke.
An RFID authentication protocol based on CDMA and anti-collision function
[J]. , 2010, 27(3): 397-403.
|
[15] |
HU Yun, YANG Shou-Bao, GUO Xiao-Lei, SHEN Qing-Wei.
Load-balanced routing strategy for Internet-accessing oriented WMN
[J]. , 2010, 27(2): 234-244.
|