[1] |
LIU Qi, BAI Xiangyu.
DTN key management scheme for content delivery in remote area
[J]. Computer Engineering and Applications, 2018, 54(11): 81-85.
|
[2] |
LI Lanying, YI Chunhuan, SUN Jianda, LI Weijia.
Key management scheme based on unital for wireless sensor networks
[J]. Computer Engineering and Applications, 2015, 51(2): 94-98.
|
[3] |
SUN Xiaoling, SUN Xuguang, LI Shanshan, CHEN Fuming, YANG Qiuge.
Key management scheme for post-disaster road monitoring system
[J]. Computer Engineering and Applications, 2013, 49(2): 130-133.
|
[4] |
ZHOU Yimin, SHEN Jiajie.
Analysing and improving security of Zeroconf networks
[J]. Computer Engineering and Applications, 2013, 49(2): 141-144.
|
[5] |
XIE Wenjun1,2, QI Rong1, XIAO Lei3.
Assessment methods of electromechanical actuation systems health situation impact on flight safety
[J]. Computer Engineering and Applications, 2013, 49(15): 242-245.
|
[6] |
DU Xiaoqiang1,2, BAO Wansu1.
Multicast key management scheme based on relationship of administrative subordination
[J]. Computer Engineering and Applications, 2013, 49(1): 101-106.
|
[7] |
LI Sujun, ZHOU Boqing, YANG Siqing.
Robust filtering false data scheme in sensor networks
[J]. Computer Engineering and Applications, 2012, 48(35): 67-70.
|
[8] |
WEN Ping1, MA Zhaofeng1,2, ZHAO Zhichao3, JIANG Ming1, NIU Xinxin1, YANG Yixian1.
Design and analysis of safety push VOD DRM system
[J]. Computer Engineering and Applications, 2012, 48(34): 69-75.
|
[9] |
LIU Weiqun, LI Yuanchen.
Delay and delay-variation bounded multicast routing algorithm based on local information
[J]. Computer Engineering and Applications, 2012, 48(34): 76-80.
|
[10] |
DOU Qiuli, LIANG Jiarong, WANG Xinyang, CAO Ruhui.
Study on fault tolerance of E-2DMesh networks based on node stochastic failure probability
[J]. Computer Engineering and Applications, 2012, 48(32): 76-79.
|
[11] |
MA Xinyu1, LONG Xiang1, FAN Xiubin2.
Construction and selection scheme of seeded-key database of collision-free CPK
[J]. Computer Engineering and Applications, 2012, 48(27): 99-104.
|
[12] |
MIAO Li, TAN Zhihua, ZHANG Dafang.
Effective model checking of network authentication protocol based on SPIN
[J]. Computer Engineering and Applications, 2012, 48(21): 62-67.
|
[13] |
YAN Haicheng, LI Hui, ZHANG Wen.
End-to-end key management based on IBE
[J]. Computer Engineering and Applications, 2012, 48(1): 116-119.
|
[14] |
ZHANG Juwei,ZHANG Liwen.
KMUIBC:Key management scheme for heterogeneous wireless sensor networks using identity-based cryptography
[J]. Computer Engineering and Applications, 2011, 47(5): 7-9.
|
[15] |
ZHOU Yuchuan,SHI Ronghua.
Key pre-distribution management scheme for clustering wireless sensor networks
[J]. Computer Engineering and Applications, 2011, 47(32): 105-107.
|