Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
Full-Text Search:
China Communications
FQ: 月刊
AD of Publication: 北京市
Lanuage: 中文;英文;
ISSN: 1673-5447
CN: 11-5439/TN
YP: 2004
Url: 中國通信學會
Recommended Journals
China Communications
2007 -01
A NEW KEY MANAGEMENT METHOD FOR AD HOC NETWORKS Chun Liu,Jianwei Liu,Qishan Zhang School of Electronics and Information Engineering, Beihang University Beijing 100083,China
Application Independent Dynamic Group-Based Key Establishment for Large-scale Wireless Sensor Networks Kashif Kifayat,Madjid Merabti,Qi Shi,David Llewellyn-Jones School of Computing & Mathematical Sciences, Liverpool John Moores University,UK.
A Two-Step Authentication Framework in Mobile Ad-Hoc Networks Nikos Komninos~*,Dimitris Vergados~(**),Christos Douligeris~(***) *Algorithms & Security Group,Athens Information Technology,19002 Peania Greece, **Dept.of Information and Communication Systems Engineering, University of the Aegean,83200 Samos Greece, ***Dept.of Informatics,University of Piraeus,18534 Piraeus Greece,
A Cumulative Authentication Method for Securing Source Routing Protocols in Ad Hoc Networks B.Moussakhani,S.M.Safavi,H.Ebrahimzad Amirkabir University of Technology Iran Telecommunication Research Center(ITRC) Tehran,Iran
Authenticating QoS-Guaranteed Multicast Route Discovery for Ad hoc Networks Yang Mingxi~1,Li Layuan~1 Fang Yiwei~2 1 School of Computer Sci.and Tech.,Wuhan Uni.of Tech.,Wuhan,China 2 Dept.of Electronics and Inf.Eng.,Huazhong Uni.of Sci.and Tech.,Wuhan,China
Authentication Methods for 802.11s Mesh Networks Xinghua Li~(1,2) Weidong Yang~1 SangJae Moon~2 Jianfeng Ma~1 1 Key Laboratory of Computer Networks and Information Security(Ministry of Education),Xidian University,Xi'an 710071,China 2 Mobile Network Security Technology Research Center,Kyungpook National University,Sankyuk-dong,Buk-ku,Daegu 702-701,Korea
An Efficient Authentication Infrastructure of WLAN Based on Self-Updating Hash Chain Haojun Zhang~1,Li Chen~(2,3),Yuefei Zhu~3 1.Computer Engineering Department,Henan University of Technology,China. 2.Henan Institute of Finance and Economics,China. 3.Network Engineering Department,Information Engineering University,China.
Techniques for Hiding Mobile Node's Location Movement Information in Mobile IP Robert H.DENG~1,Ying QIU~2,Jianying ZHOU~2,Feng BAO~2 1 Singapore Management University(SMU) 2 Institute for Infocomm Research(I2R),Singapore
SECURE USER'S MOBILITY:THE CURRENT SITUATION M.Komarova,M.Riguidel ENST,46 rue Barrault,Paris 13,France
On the QoS Assessment of Video Sessions in Heterogeneous 3G-WLAN Networks with Seamless and Secure Mobility Support Ilias Politis,Michail Tsagkaropoulos,Stavros Kotsopoulos Dept.of Electrical and Computer Engineering,University of Patras,26500 Greece Tasos Dagiuklas Dept.of Telecommunications and Network Systems,Technical Institute of Messolonghi,Nafpaktos,Greece Peter Stavroulakis Technical University of Crete,Roumeliotaki 17 str.,73100 Lentariana,Chania, Crete,Greece
MODIFIED QUANTIZATION INDEX MODULATION WATERMARKING ADAPTIVE TO CONTRAST MASKING THRESHOLDS Guoxi Wang~1,Lihong Ma~1,Decong Yu~1,Kang Cai~(1,3),Hanqing Lu~2 1.GD key Lab of Computer Network,Dept.of Electronic Engineering,South China Univ.of Tech.Guangzhou,China,510641 2.National Lab of Pattern Recognition Inst.Automation,China Academy of Science, Beijing,China,100080 3.Guangdong Telecom
2007 Issues:  [01] [02] [03] [04]
More Issues:   [2008]   [2009]   [2010]   [2011]   [2012]   [2013]   [2014]   [2015]   [2016]   [2017]
?2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved
在线中文字幕亚洲日韩_欧美 亚洲 中文字幕 高清_亚洲 日韩 中文 综合AV <蜘蛛词>| <蜘蛛词>| <蜘蛛词>| <蜘蛛词>| <蜘蛛词>| <蜘蛛词>| <蜘蛛词>| <蜘蛛词>| <蜘蛛词>| <蜘蛛词>| <蜘蛛词>| <蜘蛛词>| <蜘蛛词>| <蜘蛛词>| <蜘蛛词>| <蜘蛛词>| <蜘蛛词>| <蜘蛛词>| <蜘蛛词>| <蜘蛛词>| <蜘蛛词>| <蜘蛛词>| <蜘蛛词>| <蜘蛛词>| <蜘蛛词>| <蜘蛛词>| <蜘蛛词>| <蜘蛛词>| <蜘蛛词>| <蜘蛛词>| <蜘蛛词>| <蜘蛛词>| <蜘蛛词>| <蜘蛛词>| <蜘蛛词>| <蜘蛛词>| <蜘蛛词>| <蜘蛛词>| <蜘蛛词>| <蜘蛛词>| <蜘蛛词>| <文本链> <文本链> <文本链> <文本链> <文本链> <文本链>