PROTOCOL

作品数:982被引量:1674H指数:16
导出分析报告
相关领域:自动化与计算机技术更多>>
相关作者:邱海波黄英姿田莉刘松桥杨毅更多>>
相关机构:东南大学北京邮电大学华南理工大学湖南大学更多>>
相关期刊:更多>>
相关基金:国家自然科学基金国家重点基础研究发展计划国家高技术研究发展计划国家教育部博士点基金更多>>
-

检索结果分析

结果分析中...
选择条件:
  • 期刊=The Journal of China Universities of Posts and Telecommunicationsx
条 记 录,以下是1-10
视图:
排序:
Nearly universal and efficient quantum secure multi-party computation protocol
《The Journal of China Universities of Posts and Telecommunications》2022年第4期51-68,88,共19页Han Yushan Che Bichen Liu Jiali Dou Zhao Di Junyu 
supported by the National Key Research and Development Program of China(2020YFB1805405);the 111 Project(B21049);the Foundation of Guizhou Provincial Key Laboratory of Public Big Data(2019BDKFJJ014);the Fundamental Research Funds for the Central Universities(2020RC38)
Universality is an important property in software and hardware design.This paper concentrates on the universality of quantum secure multi-party computation(SMC)protocol.First of all,an in-depth study of universality h...
关键词:UNIVERSALITY quantum secure multi-party computation security Greenberger-Horne-Zeilinger-like state simple operation 
Performance analysis and enhancement of random access process in cellular-IoT
《The Journal of China Universities of Posts and Telecommunications》2019年第6期1-10,共10页Xing Shuchen Wen Xiangming Lu Zhaoming Pan Qi Jing Wenpeng 
supported by the National Natural Science Foundation of China(61801036);the National Science and Technology Major Project(2018ZX030110004)。
Narrowband Internet of things(NB-IoT) and enhanced machine-type communications(eMTC) are two new IoT-oriented solutions introduced by the 3 rd generation partnership project(3 GPP) in Rel-13. In order to meet the new ...
关键词:NB-IoT eMTC LTE RA access PROTOCOL 
Cryptanalysis on ‘an arbitrated quantum signature protocol based on the chained CNOT operations encryption’
《The Journal of China Universities of Posts and Telecommunications》2019年第3期73-80,共8页Wen Kai Zheng Shihui Sun Bin 
supported by the National Natural Science Foundation of China (61502048);the National Science and Technology Major Project (2017YFB0803001)
Arbitrated quantum signature(AQS) is an important branch in quantum cryptography to authenticate quantum information, and cryptanalysis on AQS protocols helps to evaluate and improve security of AQS. Recently, it is d...
关键词:arbitrated QUANTUM SIGNATURE chained CNOT FORGERY disavowal 
Two-party certificateless authenticated key agreement protocol with enhanced security被引量:5
《The Journal of China Universities of Posts and Telecommunications》2019年第1期12-20,39,共10页Wu Tao Jing Xiaojun 
Two-party certificateless authenticated key agreement(CL-AKA) protocol is a hot topic in the field of wireless communication security. An improved two-party CL-AKA protocol with enhanced security is proposed,which is ...
关键词:CERTIFICATELESS cryptography authenticated key AGREEMENT PROTOCOL two-party authentication PROTOCOL SECURITY properties 
Trusted GPSR protocol without reputation faking in VANET被引量:2
《The Journal of China Universities of Posts and Telecommunications》2015年第5期22-31 55,55,共11页Xiao Ya Zheng Shihui Sun Bin 
supported by the National Natural Science Foundation of China(61502048);242 Foundation(2015A071,2015A136)
In vehicular ad hoc network(VANET), misbehaviors of internal nodes, such as discarding packets, may lead to a rapid decline in packet delivery ratio. To solve this problem, an improvement of greedy perimeter stateless...
关键词:trusted routing protocol reputation model vehicula 
New spray and wait protocol with node activity in heterogeneous delay tolerant networks
《The Journal of China Universities of Posts and Telecommunications》2015年第2期60-68,共9页Wu Jiagao Ye Ke Zhu Yiji Liu Linfeng 
supported by the National Natural Science Foundation of China (61373139, 60903181);the Natural Science Foundation of Jiangsu Province (BK2012833);the Natural Science Foundation of Jiangsu Higher Education (12KJB520011);the Scientific Research Foundation of Nanjing University of Posts and Telecommunications (NY213161)
The spray and wait protocol is a classic copy-limited spraying protocol in delay tolerant networks, in which, the binary spray mode can be improved for heterogeneous delay tolerant networks. In this article, a new con...
关键词:delay tolerant network (DTN) routing protocol spray and wait node activity mathematical model 
Tree-based backoff protocol for fast RFID tag identification被引量:12
《The Journal of China Universities of Posts and Telecommunications》2013年第2期37-41,共5页ZHENG Jia-li QIN Tuan-fa NI Guang-nan 
supported by the National Natural Science Foundation of China(61261023);the Guangxi Natural Science Foundation(2012GXNSFBA053160,2011GXNSFA018169,2011GXNSFD018024);the Guangxi Education Department Science Foundation(201010LX016);the Guangxi Science Research and Technology Development Program(12118017-9A)
This paper proposes a tree-based backoff (TBB) protocol that reduces the number of iterations implemented in the procedure of tag collision arbitration in radio frequency identification (RFID) systems. This is ach...
关键词:RFID tag collision arbitration tree-based anti-collision protocol 
Adaptive TDMA slot assignment protocol for vehicular ad-hoc networks被引量:1
《The Journal of China Universities of Posts and Telecommunications》2013年第1期11-18,25,共9页YANG Wei-dong LI Pan LIU yan ZHU Hong-song 
supported by the National Natural Science Foundation of China (61202099, 61073180);the National Science and Technology Major Project (2010ZX03006-004);the Science and Technology Project of Henan province (102102210026);Ph.D.Programs Foundation of Henan University of Technology(2009BS021)
This paper proposes a novel adaptive time division vehicular ad-hoc networks. ATSA divides different sets multiple access (TDMA) slot assignment protocol (ATSA) for of time slots according to vehicles moving in op...
关键词:media access control (MAC) protocol TDMA slot assignment adaptive frame length binary tree 
Novel incremental relaying protocol based on spatial modulation
《The Journal of China Universities of Posts and Telecommunications》2012年第4期73-79,共7页ZHANG Zheng JI Hong LI Yi ZHANG He-li 
supported by the National Natural Science Foundation of China for Young Scholar (61001115)
This paper presents a novel incremental relaying protocol based on spatial modulation for cooperative transmission over quasi-static rayleigh fading channel, namely spatial modulation incremental relaying (SMIR), wh...
关键词:SMIR cooperative communication maximum likelihood (ML) detection 
Survey of multi-channel MAC protocols for IEEE 802.11-based wireless Mesh networks被引量:3
《The Journal of China Universities of Posts and Telecommunications》2011年第2期33-44,共12页LEI Hong-jiang GAO Chao GUO Yong-cai ZHANG Zhi-zhong 
supported by the International Scientific and Technological Cooperation Program (S2010GR0902);the Chongqing Municipal Excellent Talents (2010);the Scientific Research Fund of Municipal Education Commission of Chongqing (KJ080507);the Natural Science Foundation of Chongqing University of Posts and Telecommunications (A2009-53)
This paper reviews multi-channel media access control(MAC) protocols based on IEEE 802.11 in wireless Mesh networks(WMNs).Several key issues in multi-channel IEEE 802.11-based WMNs are introduced and typical solut...
关键词:wireless Mesh networks multi-channel protocol medium access control layer IEEE 802.11 
检索报告 对象比较 聚类工具 使用帮助 返回顶部