Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
Full-Text Search:
China Communications
FQ: 月刊
AD of Publication: 北京市
Lanuage: 中文;英文;
ISSN: 1673-5447
CN: 11-5439/TN
YP: 2004
Url: 中国通信学会
Recommended Journals
China Communications
2012 -01
Catalog
Improved Quantum "Ping-Pong" Protocol Based on ExtendedThree-Particle GHZ State Li Jian1, Guo Xiaojing1, Song Danjie1, Xie Feng2, Peng Yong2 1School of Computer, Beijing University of Posts and Telecommunications, Beijing 100876, P. R. China; 2Technical Assessment Research Laboratory, China Information Technology Security Evaluation Center, Beijing 100085, P. R. China
Robust Transmission for Cognitive Relay Networks Cao Zhigang, Wang Jianyu, Liu Juan, Wang Xijun*, Chen Wei State Key Laboratory on Microwave and Digital Communications, Tsinghua National Laboratory for Information Science and Technology (TNList), Department of Electronic Engineering, Tsinghua University, Beijing 100084, P. R. China
Hybrid Carrier Spread Spectrum System Based on 4-Weighted Fractional Fourier Transform Qiu Xin, Sha Xuejun*, Mei Lin Communication Research Center, Harbin Institute of Technology, Harbin 150001, P. R. China
Dual-Wavelength Linearization of Radio-over-Fiber Link for Broadband Access and Ubiquitous Sensing Wu Zhongle, Lv Qiang, Dai Yitang, Lin Jintong State Key Laboratory of Information Photonics and Optical Communications, Beijing University of Posts and Telecommunications, Beijing 100876, P. R China
Tree-Based Proactive Routing Protocol for Wireless Mesh Network Ji Wenjiang1, Ma Jianfeng2, Ma Zhuo2, Tian Youliang1 1School of Telecommunications Engineering, X idian University, X i'an 710071, P. R. China 2School of Computer Science and Technology, X idian University, X i'an 710071, P. R. China
Limited Feedback Bit Allocation forCooperative Multi-cell Systems withMulti-user MIMO Shi Junfeng, Zhang Tiankui, Zeng Zhimin Laboratory of Network System Architecture and Convergence, Key Laboratory of Beijing City, Beijing University of Posts and Telecommunications, Beijing 100876, P. R. China
Compressed Sensing: Optimized Overcomplete Dictionary for UnderwaterAcoustic Channel Estimation Yu Huanan, Guo Shuxu*, Qian X iaohua College of Electronic Science and Engineering, Jilin University, Changchun 130012, P. R. China
Hybrid Strategy of Particle Swarm Optimization and Simulated Annealing for Optimizing Orthomorphisms Tong Yan1,2,3, Zhang Huanguo1,3 1School of Computer, Wuhan University, Wuhan 430072, P. R. China 2Department of Computer Science, City University of Hong Kong, Hong Kong, P. R. China 3Key Laboratory of Aerospace Information Security and Trusted Computing of Ministry of Education, Wuhan University, Wuhan 430072, P. R. China
Pitfalls in Identity Based Encryption Using Extended Chebyshev Polynomial Qian Haifeng1,2,3, Li Xiangxue1*, Yu Yu1 1 Department of Computer Science and Technology, East China Normal University, Shanghai 200241, P. R. China 2 Hangzhou Key Lab of E-business and Information Security, Hangzhou Normal University, Hangzhou 310036, P. R. China 3 State Key Laboratory of Integrated Services Networks, Xidian University, Xi'an 710071, P. R. China
Password-Authenticated Multiple Key Exchange Protocol for Mobile Applications Li Wenmin, Wen Qiaoyan, Su Qi, Zhang Hua, Jin Zhengping State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, P. R. China
Chaotic Image Encryption Algorithm byCorrelating Keys with Plaintext Zhu Congxu1, Sun Kehui2 1School of Information Science and Engineering, Central South University, Changsha 410083, P. R. China 2School of Physics and Electronics, Central South University, Changsha 410083, P. R. China
Threshold Ring Signature Scheme Based on TPM Gong Bei1,3,4, Jiang Wei1,3,4, Lin Li1, Li Yu1, Zhang Xing2 1College of Computer Science, Beijing University of Technology, Beijing 100124, P. R. China 2Institute of Electronic Technology, Information Engineering University, Zhengzhou 450004, P. R. China 3State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences Beijing, Beijing 100049, P. R. China 4Key Laboratory of Information and Network Security, 3rd Research Institute, Ministry of Public Security, Shanghai 201204, P. R. China
EBS-Based Collusion ResistantGroup Key Management Using Attribute-Based Encryption Chen Yanli1, Yang Geng2 1College of Computer, Nanjing University of Post &Telecommunications, Nanjing 210003, P. R. China 2Overseas Cooperation & Exchange Office, Nanjing University of Post &Telecommunications, Nanjing 210003, P. R. China
Scalable and Identifier/ Locator-Splitting Routing Protocol for Mobile Ad Hoc Networks Wang Haiquan1, 2, 4, Chen Meng1, 2, Hu Junshun1, 2, Xia Chunhe1, 2, 3* 1Beijing Key Laboratory of Network Technology, Beihang University, Beijing 100191, P. R. China 2School of Computer Science and Engineering, Beihang University, Beijing 100191, P. R. China 3State Key Laboratory of Virtual Reality Technology and System, Beihang University, Beijing 100191, P. R. China 4School of Software, Beihang University, Beijing 100191, P. R. China
Link-Vertex Topology Aggregation for Multi-domain Path Computation with Hierarchical PCE Architecture Peng Yunfeng1, Chen Zhen2, Zhao Changming2, Wang Zongwei2, Long Keping1 1University of Science and Technology of Beijing, Beijing 100083, P. R. China 2University of Electronic Science and Technology of China, Chengdu 611731, P. R. China
2012 Issues:  [01] [02] [03] [04] [05] [06] [07] [08] [09] [10] [11] [12]
More Issues:   [2007]   [2008]   [2009]   [2010]   [2011]   [2013]   [2014]   [2015]   [2016]   [2017]
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved