[1] |
LIU Qi, BAI Xiangyu.
DTN key management scheme for content delivery in remote area
[J]. Computer Engineering and Applications, 2018, 54(11): 81-85.
|
[2] |
LI Lanying, YI Chunhuan, SUN Jianda, LI Weijia.
Key management scheme based on unital for wireless sensor networks
[J]. Computer Engineering and Applications, 2015, 51(2): 94-98.
|
[3] |
ZHANG Qinglin.
Prediction model of mobility in MANET based on extreme learning machines
[J]. Computer Engineering and Applications, 2014, 50(12): 71-76.
|
[4] |
SHI Dongsheng.
Strongly secure certificateless signcryption scheme in standard model
[J]. Computer Engineering and Applications, 2013, 49(22): 90-94.
|
[5] |
SUN Xiaoling, SUN Xuguang, LI Shanshan, CHEN Fuming, YANG Qiuge.
Key management scheme for post-disaster road monitoring system
[J]. Computer Engineering and Applications, 2013, 49(2): 130-133.
|
[6] |
ZHOU Yimin, SHEN Jiajie.
Analysing and improving security of Zeroconf networks
[J]. Computer Engineering and Applications, 2013, 49(2): 141-144.
|
[7] |
LIU Yafeng, ZHONG Hong, SHI Runhua, SUN Su.
Dynamic trust evaluation for MANETs based on credibility
[J]. Computer Engineering and Applications, 2013, 49(17): 78-81.
|
[8] |
DU Xiaoqiang1,2, BAO Wansu1.
Multicast key management scheme based on relationship of administrative subordination
[J]. Computer Engineering and Applications, 2013, 49(1): 101-106.
|
[9] |
LI Sujun, ZHOU Boqing, YANG Siqing.
Robust filtering false data scheme in sensor networks
[J]. Computer Engineering and Applications, 2012, 48(35): 67-70.
|
[10] |
WEN Ping1, MA Zhaofeng1,2, ZHAO Zhichao3, JIANG Ming1, NIU Xinxin1, YANG Yixian1.
Design and analysis of safety push VOD DRM system
[J]. Computer Engineering and Applications, 2012, 48(34): 69-75.
|
[11] |
MA Xinyu1, LONG Xiang1, FAN Xiubin2.
Construction and selection scheme of seeded-key database of collision-free CPK
[J]. Computer Engineering and Applications, 2012, 48(27): 99-104.
|
[12] |
ZHOU Peng1,2.
Fast adaptive backup routing for mobile Ad Hoc network
[J]. Computer Engineering and Applications, 2012, 48(23): 21-26.
|
[13] |
MIAO Li, TAN Zhihua, ZHANG Dafang.
Effective model checking of network authentication protocol based on SPIN
[J]. Computer Engineering and Applications, 2012, 48(21): 62-67.
|
[14] |
YAN Haicheng, LI Hui, ZHANG Wen.
End-to-end key management based on IBE
[J]. Computer Engineering and Applications, 2012, 48(1): 116-119.
|
[15] |
ZHANG Juwei,ZHANG Liwen.
KMUIBC:Key management scheme for heterogeneous wireless sensor networks using identity-based cryptography
[J]. Computer Engineering and Applications, 2011, 47(5): 7-9.
|