[1] |
LI Qian1, WANG Zheng1, MA Jianfen1, LI Na2.
Lightweight mobile payment protocol fairness analysis
[J]. Computer Engineering and Applications, 2018, 54(19): 82-87.
|
[2] |
YU Lei1, WEI Shimin1, ZHUO Zepeng2.
Research on consistence of strand parameters for protocol principals in authentication test theory
[J]. Computer Engineering and Applications, 2015, 51(13): 86-91.
|
[3] |
YU Lei, WEI Shimin.
Analysis on properties for principals’ keys on construction of test components
[J]. Computer Engineering and Applications, 2013, 49(6): 114-117.
|
[4] |
WANG Chengliang1, YUAN Fangzhou1, CHEN Juanjuan2.
Limited quota distribution design and research of 3G online charging system
[J]. Computer Engineering and Applications, 2013, 49(3): 258-262.
|
[5] |
LIU Yonglei1,2, JIN Zhigang3.
Security analysis of WPS in WLAN
[J]. Computer Engineering and Applications, 2013, 49(21): 87-89.
|
[6] |
HUANG Liping, SUN Yongxiong, SHEN Chen.
Applying Gaussian process based on median filtering in 3G network performance prediction
[J]. Computer Engineering and Applications, 2013, 49(2): 126-129.
|
[7] |
YU Lei, WEI Shimin.
Security analysis of mutual-authentication cryptographic protocol in network management
[J]. Computer Engineering and Applications, 2012, 48(4): 94-96.
|
[8] |
CAO Lifeng1, CHEN Xingyuan1, DU Xuehui1, WANG Huaipeng2.
Multi-level secure tunnel establishment protocol and its security analysis
[J]. Computer Engineering and Applications, 2012, 48(20): 117-122.
|
[9] |
CHEN Liang1, LI Yu1, XU Jing2, HU Yanjun1.
Study of HARQ retransmission scheme in LTE uplink
[J]. Computer Engineering and Applications, 2012, 48(13): 94-99.
|
[10] |
JIANG Guosong,HE Xiaoling.
Wireless system design of power line field operation
[J]. Computer Engineering and Applications, 2011, 47(33): 229-231.
|
[11] |
GE Lunyue,WU Qilin,TIAN Yiming,LU Yang.
Analysis and improvement of VoIP capacity in IEEE 802.11e WLAN
[J]. Computer Engineering and Applications, 2011, 47(18): 73-75.
|
[12] |
LI Zhihai1,2,LI Wenshi1,2.
Research on uplink bit error rate of 3rd generation mobile communication
[J]. Computer Engineering and Applications, 2011, 47(17): 111-113.
|
[13] |
DENG Fan,DENG Shaofeng,LI Yifa.
Provable secure authenticated key exchange protocol under standard model
[J]. Computer Engineering and Applications, 2011, 47(13): 106-109.
|
[14] |
XU Wan-fu,HOU Hui-fang.
Analysis and amendment of EAP-AKA protocol in 3G-WLAN interworking
[J]. Computer Engineering and Applications, 2010, 46(32): 81-83.
|
[15] |
YUAN Zheng-wu,LI Yi-chao,LI Lin,MU Wei.
Acceleration method of ray tracing based on dynamic zoning
[J]. Computer Engineering and Applications, 2010, 46(27): 77-79.
|