电子与信息学报
   
  
   Home  |  About Journal  |  Ethics Statement  |  Editorial Board  |  Instruction  |  Subscriptions  |  Contacts Us  |  Message  |  Chinese
电子与信息学报
OFFICE ONLINE
 ·Author Center
 ·Peer Review
 ·Editor Work
 ·Office Work
 ·Editor-in-chief
 
JOURNAL
 ·Forthcoming Articles
 ·Current Issue
 ·Next Issue
 ·Archive
 ·Advanced Search
 ·Archive By Volume
 ·Archive By Subject
 ·Email Alert
 ·
 
Hot Paper
 ·Top Cited
 ·TOP Read Articles
 ·TOP Download Articles
 
Other articles related with "TP309.2":
2633 ZHOU Zhiping, ZHANG Huigen, SUN Ziwen, LI Jing
  Improved Privacy Protection Handover Authentication Protocol for Vehicular Ad Hoc Networks
    JEIT   2016 Vol.38 (10): 2633-2639 [Abstract] (163) [HTML 1 KB] [PDF 337 KB] (624)
340 HE Yunhua, SUN Limin, YANG Weidong, LI Hong
  Enhancing Privacy Preserving for Crowdsourced Monitoring A Game Theoretic Analysis Based Approach
    JEIT   2016 Vol.38 (2): 340-346 [Abstract] (235) [HTML 1 KB] [PDF 573 KB] (892)
94 Liu Xue-Feng, Zhang Yu-Qing, Wang He, Zhang Guang-Hua
  An Efficient Anonymity Message Authentication with Backward Secure Revocation for Vehicular Ad Hoc Networks
    JEIT   2014 Vol.36 (1): 94-100 [Abstract] (1415) [HTML 1 KB] [PDF 287 KB] (1034)
101 Wang Chen-Xu, Li Jing-Hu, Yu Ming-Yan, Wang Jin-Xiang
  Power Analysis Security Evaluation on Piccolo Based on FPGA Platform
    JEIT   2014 Vol.36 (1): 101-107 [Abstract] (1559) [HTML 1 KB] [PDF 355 KB] (4148)
1933 Zhou Hua, Zhou Hai-Jun, Ma Jian-Feng
  Security Analysis Model of Intrusion Tolerant Systems Based on Game Theory
    JEIT   2013 Vol.35 (8): 1933-1939 [Abstract] (1653) [HTML 1 KB] [PDF 322 KB] (1235)
1766 Fu Dong-Lai, Peng Xin-Guang, Yang Yu-Li
  Trusted Platform Module-based Scheme for Secure Access to Outsourced Data
    JEIT   2013 Vol.35 (7): 1766-1773 [Abstract] (1554) [HTML 1 KB] [PDF 265 KB] (1133)
278 Zhu You-Wen, Huang Liu-Sheng, Li Dong, Yang Wei
  Privacy-preserving Text Information Hiding Detecting Algorithm
    JEIT   2011 Vol.33 (2): 278-283 [Abstract] (2571) [HTML 1 KB] [PDF 240 KB] (939)
1497 Li Xin-guo①②; Ge Jian-hua; Zhao Chun-ming
  Smartcard-Based System for Multicast Content Protection and Payment
    JEIT   2006 Vol.28 (8): 1497-1500 [Abstract] (1754) [HTML 1 KB] [PDF 221 KB] (855)
1308 Wang Xiao-ming; Zhang Zhen; Fu Fang-wei
  A Secure Threshold Proxy Signature Scheme
    JEIT   2006 Vol.28 (7): 1308-1311 [Abstract] (1986) [HTML 1 KB] [PDF 221 KB] (825)
1145 Ma Chun-bo①②; Ao Jun; He Da-ke
  ID Based Group Oriented Signature
    JEIT   2006 Vol.28 (6): 1145-1149 [Abstract] (1708) [HTML 1 KB] [PDF 223 KB] (950)
823 Wu Ke-li①②; Wu Bin; Wei Xiang-he; Liu Feng-yu
  A Structured Multi-signature Scheme with Signers’ Intentions
    JEIT   2006 Vol.28 (5): 823-826 [Abstract] (2024) [HTML 1 KB] [PDF 220 KB] (1026)
299 Zhao Yuan-chao; Li Dao-ben
  A Novel Construction of Re-initializable Multi-Hash Chains
    JEIT   2006 Vol.28 (2): 299-302 [Abstract] (1811) [HTML 1 KB] [PDF 193 KB] (893)
First page | Prev page | Next page | Last pagePage 1 of 1, 12 records
     京ICP备05002787号

© 2010 JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY
Institute of Electronics, Chinese Academy of Sciences, P.O.Box 2702, Beijing 100190
Tel: +86-10-58887066 Fax: +86-10- 58887539,Email: jeit@mail.ie.ac.cn

Supported by:Beijing Magtech