电子与信息学报
   
  
   Home  |  About Journal  |  Ethics Statement  |  Editorial Board  |  Instruction  |  Subscriptions  |  Contacts Us  |  Message  |  Chinese
电子与信息学报
OFFICE ONLINE
 ·Author Center
 ·Peer Review
 ·Editor Work
 ·Office Work
 ·Editor-in-chief
 
JOURNAL
 ·Forthcoming Articles
 ·Current Issue
 ·Next Issue
 ·Archive
 ·Advanced Search
 ·Archive By Volume
 ·Archive By Subject
 ·Email Alert
 ·
 
Hot Paper
 ·Top Cited
 ·TOP Read Articles
 ·TOP Download Articles
 
Other articles related with "TN918":
950 Yu Bin; Xu Xiao-hui; Fang Li-guo
  A Cheater Detectable VCS Based on Cumulative Array
    JEIT   2009 Vol.31 (4): 950-953 [Abstract] (2324) [HTML 1 KB] [PDF 424 KB] (925)
954 Zhao Sheng-mei; Li Miao-miao; Zheng Bao-yu
  A Novel Quantum Key Distribution Protocol Based on Quantum Error Correction Code
    JEIT   2009 Vol.31 (4): 954-957 [Abstract] (2967) [HTML 1 KB] [PDF 225 KB] (1700)
740 Chen Shi-wei; Jin Chen-hui
  A New Set of Sufficient Conditions for MD5 Collisions
    JEIT   2009 Vol.31 (3): 740-744 [Abstract] (2415) [HTML 1 KB] [PDF 200 KB] (1031)
756 Li Hui①②; Song Yao-liang; Yang Yu-wang
  A Novel Time-Hopping Multiple-Access DCSK System Designing and Analysis
    JEIT   2009 Vol.31 (3): 756-758 [Abstract] (2587) [HTML 1 KB] [PDF 201 KB] (1069)
435 Zhou Yu; Wang Wei-qiong①②; Xiao Guo-zhen
  Global Avalanche Characteristics and Nonlinearity of Boolean Function with the Hamming Weight k
    JEIT   2009 Vol.31 (2): 435-438 [Abstract] (2762) [HTML 1 KB] [PDF 188 KB] (1096)
489 Chen Guo-min; Chen Xiao-feng
  A New Secure Universal Designated Verifier Signature Proof System
    JEIT   2009 Vol.31 (2): 489-492 [Abstract] (2529) [HTML 1 KB] [PDF 197 KB] (987)
493 Wang Tian-yin①②; Liu Mai-xue; Wen Qiao-yan
  Cryptanalysis of Three Blind Proxy Multi-signature Schemes
    JEIT   2009 Vol.31 (2): 493-496 [Abstract] (2381) [HTML 1 KB] [PDF 212 KB] (720)
71 Sun Ke-hui; Shang Fang; Zhong Ke; Sheng Zhe
  Synchronous Control Between Unified Chaotic System and Its Modified System Based on Intermittent Feedback
    JEIT   2009 Vol.31 (1): 71-74 [Abstract] (2589) [HTML 1 KB] [PDF 237 KB] (965)
246 Yu Bao-zheng; Xu Cong-wei
  Forgery Attacks on a Series Group Signature Schemes
    JEIT   2009 Vol.31 (1): 246-249 [Abstract] (2219) [HTML 1 KB] [PDF 185 KB] (799)
2987 Zhu Zhi-Liang, Li Shu-Ping, Yu Hai
  A Method of Chaotic Generalized Synchronization with the Stability of Error System
    JEIT   2008 Vol.30 (12): 2987-2990 [Abstract] (2477) [HTML 1 KB] [PDF 233 KB] (1025)
2991 Jing Dong-Liang, Zhao Ya-Qun
  On Properties and Constructions of Multi-output Plateaued Functions
    JEIT   2008 Vol.30 (12): 2991-2995 [Abstract] (2689) [HTML 1 KB] [PDF 220 KB] (845)
2588 Tao Yuan, Pan Wei, Luo Bin, Li Feng
  A Scheme for Quantum Key Distribution Between Any Two Users in a Network via W State
    JEIT   2008 Vol.30 (11): 2588-2591 [Abstract] (2512) [HTML 1 KB] [PDF 201 KB] (953)
2592 Tan Lin, Qi Wen-Feng
  On the k-error Sequences of 2n-Periodic Binary Sequences
    JEIT   2008 Vol.30 (11): 2592-2595 [Abstract] (2467) [HTML 1 KB] [PDF 196 KB] (866)
2459 Xiao Huang-Pei, Zhang Guo-Ji
  The Improvement on Algebraic System of Multivariate Quadratic Equations for Rijndael
    JEIT   2008 Vol.30 (10): 2459-2463 [Abstract] (2438) [HTML 1 KB] [PDF 212 KB] (920)
2464 Zhang Bin, Jin Chen-Hui
  Inversion Attack Based on Back Tracking Method
    JEIT   2008 Vol.30 (10): 2464-2467 [Abstract] (2331) [HTML 1 KB] [PDF 199 KB] (912)
2468 Liu Wen-Yuan, Tong Feng, Wang Bao-Wen, Wang Ya-Dong
  A New Proxy Blind Signature Scheme with Proxy Revocation
    JEIT   2008 Vol.30 (10): 2468-2471 [Abstract] (2753) [HTML 1 KB] [PDF 190 KB] (1045)
1441 Liu Jin-long; Xu Zong-ze
  Cartesian Product and Authentication Codes
    JEIT   2008 Vol.30 (6): 1441-1444 [Abstract] (2214) [HTML 1 KB] [PDF 198 KB] (1020)
1445 Chen Shi-we;i Jin Chen-hui
  Analysis of the Noise Functions of Macrocosm Approximation of Binary Addition and Triple Addition Modulo 2n with XOR
    JEIT   2008 Vol.30 (6): 1445-1449 [Abstract] (2596) [HTML 1 KB] [PDF 201 KB] (1027)
1450 Jiang Zheng-tao; Zhang Jing-liang; Wang Yu-min
  Research on a New Public Key Cryptosystem as Secure as Integer Factorization
    JEIT   2008 Vol.30 (6): 1450-1452 [Abstract] (2419) [HTML 1 KB] [PDF 202 KB] (970)
1453 Zhao Yao-dong; Qi Wen-feng
  The Attack on RSA with Small Private Key and Primes Sharing Least-Significant Bits
    JEIT   2008 Vol.30 (6): 1453-1456 [Abstract] (2389) [HTML 1 KB] [PDF 191 KB] (1079)
1210 Liu Jin-long; Xu Zong-ze
  A Construction of Cartesian Authentication Codes with Arbitrary Amounts of Sources and Authentication Symbols(Ⅱ)
    JEIT   2008 Vol.30 (5): 1210-1213 [Abstract] (2265) [HTML 1 KB] [PDF 200 KB] (761)
660 Hu Bin; Jin Chen-hui; Feng Chun-hai
  Cryptographic Properties of Plateaued Functions
    JEIT   2008 Vol.30 (3): 660-664 [Abstract] (2185) [HTML 1 KB] [PDF 205 KB] (835)
665 Jin Chen-hui; Shi Jian-hong; Deng Hui
  Analysis of the Minimum Decimation Distance of Decimation Attack
    JEIT   2008 Vol.30 (3): 665-667 [Abstract] (2415) [HTML 1 KB] [PDF 184 KB] (907)
668 Ming Yang; Wang Yu-min
  Designated Verifier Proxy Signature Scheme without Random Oracles
    JEIT   2008 Vol.30 (3): 668-671 [Abstract] (2381) [HTML 1 KB] [PDF 204 KB] (964)
89 Wang Shi-yuan; Feng Jiu-chao①②
  A Method of Chaotic Communication Based on Particle Filter
    JEIT   2008 Vol.30 (1): 89-92 [Abstract] (2499) [HTML 1 KB] [PDF 262 KB] (1548)
93 Liu Jin-long; Xu Zong-ze
  On the Theory and Construction of CARTESIAN Authentication Codes
    JEIT   2008 Vol.30 (1): 93-95 [Abstract] (2032) [HTML 1 KB] [PDF 176 KB] (924)
245

Guo Gang;Zeng Guo-ping

  Improvement of a New Proxy Signature Scheme
    JEIT   2008 Vol.30 (1): 245-248 [Abstract] (2441) [HTML 1 KB] [PDF 222 KB] (765)
2974 Hu Xue-xian;Liu Wen-fen; Li Shi-qu
  A Probabilistic Model of the Bilateral Stop/Go Generator
    JEIT   2007 Vol.29 (12): 2974-2977 [Abstract] (2364) [HTML 1 KB] [PDF 227 KB] (900)
2641 Liu Yang-zheng; Jiang Chang-sheng; Lin Chang-sheng; Xiong Xin; Shi Lei
  Chaotic Synchronization Secure Communications Based on the Lorenz Systems Switch
    JEIT   2007 Vol.29 (11): 2641-2644 [Abstract] (2693) [HTML 1 KB] [PDF 293 KB] (1127)
2645 Wang Ling-ling; Zhang Guo-yin; Ma Chun-guang
  An Identity-Based Ring Signature Scheme with Constant-Size Signature
    JEIT   2007 Vol.29 (11): 2645-2648 [Abstract] (2653) [HTML 1 KB] [PDF 243 KB] (1146)
First page | Prev page | Next page | Last pagePage 5 of 11, 326 records
     京ICP备05002787号

© 2010 JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY
Institute of Electronics, Chinese Academy of Sciences, P.O.Box 2702, Beijing 100190
Tel: +86-10-58887066 Fax: +86-10- 58887539,Email: jeit@mail.ie.ac.cn

Supported by:Beijing Magtech