supported by the National Key Research and Development Program of China(2020YFB1805405);the 111 Project(B21049);the Foundation of Guizhou Provincial Key Laboratory of Public Big Data(2019BDKFJJ014);the Fundamental Research Funds for the Central Universities(2020RC38)
Universality is an important property in software and hardware design.This paper concentrates on the universality of quantum secure multi-party computation(SMC)protocol.First of all,an in-depth study of universality h...
supported by the National Natural Science Foundation of China(61801036);the National Science and Technology Major Project(2018ZX030110004)。
Narrowband Internet of things(NB-IoT) and enhanced machine-type communications(eMTC) are two new IoT-oriented solutions introduced by the 3 rd generation partnership project(3 GPP) in Rel-13. In order to meet the new ...
supported by the National Natural Science Foundation of China (61502048);the National Science and Technology Major Project (2017YFB0803001)
Arbitrated quantum signature(AQS) is an important branch in quantum cryptography to authenticate quantum information, and cryptanalysis on AQS protocols helps to evaluate and improve security of AQS. Recently, it is d...
Two-party certificateless authenticated key agreement(CL-AKA) protocol is a hot topic in the field of wireless communication security. An improved two-party CL-AKA protocol with enhanced security is proposed,which is ...
supported by the National Natural Science Foundation of China(61502048);242 Foundation(2015A071,2015A136)
In vehicular ad hoc network(VANET), misbehaviors of internal nodes, such as discarding packets, may lead to a rapid decline in packet delivery ratio. To solve this problem, an improvement of greedy perimeter stateless...
supported by the National Natural Science Foundation of China (61373139, 60903181);the Natural Science Foundation of Jiangsu Province (BK2012833);the Natural Science Foundation of Jiangsu Higher Education (12KJB520011);the Scientific Research Foundation of Nanjing University of Posts and Telecommunications (NY213161)
The spray and wait protocol is a classic copy-limited spraying protocol in delay tolerant networks, in which, the binary spray mode can be improved for heterogeneous delay tolerant networks. In this article, a new con...
supported by the National Natural Science Foundation of China(61261023);the Guangxi Natural Science Foundation(2012GXNSFBA053160,2011GXNSFA018169,2011GXNSFD018024);the Guangxi Education Department Science Foundation(201010LX016);the Guangxi Science Research and Technology Development Program(12118017-9A)
This paper proposes a tree-based backoff (TBB) protocol that reduces the number of iterations implemented in the procedure of tag collision arbitration in radio frequency identification (RFID) systems. This is ach...
supported by the National Natural Science Foundation of China (61202099, 61073180);the National Science and Technology Major Project (2010ZX03006-004);the Science and Technology Project of Henan province (102102210026);Ph.D.Programs Foundation of Henan University of Technology(2009BS021)
This paper proposes a novel adaptive time division vehicular ad-hoc networks. ATSA divides different sets multiple access (TDMA) slot assignment protocol (ATSA) for of time slots according to vehicles moving in op...
supported by the National Natural Science Foundation of China for Young Scholar (61001115)
This paper presents a novel incremental relaying protocol based on spatial modulation for cooperative transmission over quasi-static rayleigh fading channel, namely spatial modulation incremental relaying (SMIR), wh...
supported by the International Scientific and Technological Cooperation Program (S2010GR0902);the Chongqing Municipal Excellent Talents (2010);the Scientific Research Fund of Municipal Education Commission of Chongqing (KJ080507);the Natural Science Foundation of Chongqing University of Posts and Telecommunications (A2009-53)
This paper reviews multi-channel media access control(MAC) protocols based on IEEE 802.11 in wireless Mesh networks(WMNs).Several key issues in multi-channel IEEE 802.11-based WMNs are introduced and typical solut...