  |
|
 |
|
 |
China Communications |
|
FQ: 月刊 |
AD of Publication: 北京市 |
Lanuage: 中文;英文; |
ISSN: 1673-5447 |
CN: 11-5439/TN |
YP: 2004 |
Url: 中國通信學會 |
|
|
 |
|
 |
Recommended Journals |
|
|
|
 |
|
|
 |
2007
-01 |
Catalog
|
 |
A NEW KEY MANAGEMENT METHOD FOR AD HOC NETWORKS |
|
Chun Liu,Jianwei Liu,Qishan Zhang School of Electronics and Information Engineering, Beihang University Beijing 100083,China |  |
Application Independent Dynamic Group-Based Key Establishment for Large-scale Wireless Sensor Networks |
|
Kashif Kifayat,Madjid Merabti,Qi Shi,David Llewellyn-Jones School of Computing & Mathematical Sciences, Liverpool John Moores University,UK. |  |
A Two-Step Authentication Framework in Mobile Ad-Hoc Networks |
|
Nikos Komninos~*,Dimitris Vergados~(**),Christos Douligeris~(***) *Algorithms & Security Group,Athens Information Technology,19002 Peania Greece, **Dept.of Information and Communication Systems Engineering, University of the Aegean,83200 Samos Greece, ***Dept.of Informatics,University of Piraeus,18534 Piraeus Greece, |  |
A Cumulative Authentication Method for Securing Source Routing Protocols in Ad Hoc Networks |
|
B.Moussakhani,S.M.Safavi,H.Ebrahimzad Amirkabir University of Technology Iran Telecommunication Research Center(ITRC) Tehran,Iran |  |
Authenticating QoS-Guaranteed Multicast Route Discovery for Ad hoc Networks |
|
Yang Mingxi~1,Li Layuan~1 Fang Yiwei~2 1 School of Computer Sci.and Tech.,Wuhan Uni.of Tech.,Wuhan,China 2 Dept.of Electronics and Inf.Eng.,Huazhong Uni.of Sci.and Tech.,Wuhan,China |  |
Authentication Methods for 802.11s Mesh Networks |
|
Xinghua Li~(1,2) Weidong Yang~1 SangJae Moon~2 Jianfeng Ma~1 1 Key Laboratory of Computer Networks and Information Security(Ministry of Education),Xidian University,Xi'an 710071,China 2 Mobile Network Security Technology Research Center,Kyungpook National University,Sankyuk-dong,Buk-ku,Daegu 702-701,Korea |  |
An Efficient Authentication Infrastructure of WLAN Based on Self-Updating Hash Chain |
|
Haojun Zhang~1,Li Chen~(2,3),Yuefei Zhu~3 1.Computer Engineering Department,Henan University of Technology,China. 2.Henan Institute of Finance and Economics,China. 3.Network Engineering Department,Information Engineering University,China. |  |
Techniques for Hiding Mobile Node's Location Movement Information in Mobile IP |
|
Robert H.DENG~1,Ying QIU~2,Jianying ZHOU~2,Feng BAO~2 1 Singapore Management University(SMU) 2 Institute for Infocomm Research(I2R),Singapore |  |
SECURE USER'S MOBILITY:THE CURRENT SITUATION |
|
M.Komarova,M.Riguidel ENST,46 rue Barrault,Paris 13,France |  |
On the QoS Assessment of Video Sessions in Heterogeneous 3G-WLAN Networks with Seamless and Secure Mobility Support |
|
Ilias Politis,Michail Tsagkaropoulos,Stavros Kotsopoulos Dept.of Electrical and Computer Engineering,University of Patras,26500 Greece Tasos Dagiuklas Dept.of Telecommunications and Network Systems,Technical Institute of Messolonghi,Nafpaktos,Greece Peter Stavroulakis Technical University of Crete,Roumeliotaki 17 str.,73100 Lentariana,Chania, Crete,Greece |  |
MODIFIED QUANTIZATION INDEX MODULATION WATERMARKING ADAPTIVE TO CONTRAST MASKING THRESHOLDS |
|
Guoxi Wang~1,Lihong Ma~1,Decong Yu~1,Kang Cai~(1,3),Hanqing Lu~2 1.GD key Lab of Computer Network,Dept.of Electronic Engineering,South China Univ.of Tech.Guangzhou,China,510641 2.National Lab of Pattern Recognition Inst.Automation,China Academy of Science, Beijing,China,100080 3.Guangdong Telecom |
|