[1] |
XU Guoyu, XU Gang, JIANG Tao, HU Haitao.
Research on Quantitative Analysis of Authentication Mechanism Performance for Space-Ground Integrated Information Network
[J]. Computer Engineering and Applications, 2020, 56(21): 108-114.
|
[2] |
SHI Hui, CAI Yueming, YANG Weiwei, XIANG Zhongwu, CHEN Dechuan.
Secure Performance Analysis on Untrusted Relay Network with TSR over Nakagami-[m] Channel
[J]. Computer Engineering and Applications, 2020, 56(12): 98-104.
|
[3] |
HUANG Guosheng1, 2, XIA Minghua2.
USBKey aided certificateless mobile IP registration authentication protocol
[J]. Computer Engineering and Applications, 2018, 54(9): 96-100.
|
[4] |
JIANG Jieqi, YANG Geng, LI Peng.
Analysis of users’ behavior under cloud computing environment
[J]. Computer Engineering and Applications, 2018, 54(14): 127-132.
|
[5] |
CUI Jiaqi, YANG Jianfeng, XU Jun, GUO Chengcheng.
CSMA/CA performance analysis in hybrid CSMA/CA and TDMA networks
[J]. Computer Engineering and Applications, 2017, 53(20): 83-88.
|
[6] |
FU Fa1, ZHOU Xing1, TAN Yuyin1, Thomas Dreibholz2, Hakim Adhari3, Erwin P. Rathgeb3.
Performance analysis of MPTCP protocol in multiple scenarios
[J]. Computer Engineering and Applications, 2016, 52(5): 89-93.
|
[7] |
LI Yang1, JIN Lisha2, HOU Yukan2, ZHANG Jie2.
Rapid configuration method of production status for assembly station based on performance analysis
[J]. Computer Engineering and Applications, 2016, 52(24): 229-235.
|
[8] |
GUO Yanyifu1, LIU Hongli1, XU Kun1, MA Ziji1, LIU Shugang2.
Performance analysis of RSSI in underground tunnel based on WSN
[J]. Computer Engineering and Applications, 2016, 52(17): 128-132.
|
[9] |
PAN Chunyu, YAN Kun, ZHANG Xiangli.
Efficient channel selection mechanism for CR spectrum handoff
[J]. Computer Engineering and Applications, 2015, 51(20): 97-101.
|
[10] |
FU Fa1, ZHOU Xing1, YANG Xiong1, Hakim Adhari2, Erwin P.Rathgeb2.
Performance analysis of MPTCP and CMT-SCTP multi-path transport protocols
[J]. Computer Engineering and Applications, 2013, 49(21): 79-82.
|
[11] |
WANG Huaqiu1, LUO Jiang1, Michael GERNDT2, Ventsislav PETKOV2.
Research and application of harmony search fuzzy clustering with feature selection
[J]. Computer Engineering and Applications, 2013, 49(19): 112-118.
|
[12] |
SUN Jingang1,2, ZHANG Xihuang1.
Improved intra-domain handover route optimization approach based on PMIPv6
[J]. Computer Engineering and Applications, 2012, 48(4): 79-82.
|
[13] |
XU Xingqi1, PAN Jin1, GUO Chao2, CHEN Zhiguang1.
Research on efficient authentication mechanism in MIPv6 fast hierarchical handoff
[J]. Computer Engineering and Applications, 2012, 48(2): 69-75.
|
[14] |
JIN Ying1, WU Qilin2, ZHANG Yiwen3.
Research on performance analysis for MAC protocol in wireless local area network
[J]. Computer Engineering and Applications, 2012, 48(17): 105-113.
|
[15] |
WANG Gaining, WU Zhenqiang, MA Yalei, SHAO Zhiyi.
Secure network coding model on low bandwidth network
[J]. Computer Engineering and Applications, 2012, 48(11): 93-96.
|