电子与信息学报
   
  
   Home  |  About Journal  |  Ethics Statement  |  Editorial Board  |  Instruction  |  Subscriptions  |  Contacts Us  |  Message  |  Chinese
电子与信息学报
OFFICE ONLINE
 ·Author Center
 ·Peer Review
 ·Editor Work
 ·Office Work
 ·Editor-in-chief
 
JOURNAL
 ·Forthcoming Articles
 ·Current Issue
 ·Next Issue
 ·Archive
 ·Advanced Search
 ·Archive By Volume
 ·Archive By Subject
 ·Email Alert
 ·
 
Hot Paper
 ·Top Cited
 ·TOP Read Articles
 ·TOP Download Articles
 
Other articles related with "TP393.08":
272 Hu Yu-xiang,Lan Ju-long,Wu Jun-ting
  The Switch Structure and Scheduling Algorithm for Maintaining Packet Order in Multistage Switching Fabric
    JEIT   2010 Vol.32 (2): 272-277 [Abstract] (2353) [HTML 1 KB] [PDF 432 KB] (1220)
183 Luo Chang-yuan; L i Wei①②; Xing Hong-zhi; Chu Xiao
  Research on Identity-based Distributed Key Management in Space Network
    JEIT   2010 Vol.32 (1): 183-188 [Abstract] (3152) [HTML 1 KB] [PDF 279 KB] (1369)
2316 Luo Chang-yuan; Li Wei①②; Li Hai-lin; Jian Bo
  Measurement Method for Space Networks Authenticated Key Security under Distributed CA
    JEIT   2009 Vol.31 (10): 2316-2320 [Abstract] (2366) [HTML 1 KB] [PDF 238 KB] (944)
2237 Zhou Ye-jun; Li Hui; Ma Jian-feng
  Secure Error-Correction Network Coding
    JEIT   2009 Vol.31 (9): 2237-2241 [Abstract] (2492) [HTML 1 KB] [PDF 208 KB] (981)
2247 Zhou Nan-run; Wan Hui
  Distributed Authentication Scheme for Cluster-Based Ad hoc Networks
    JEIT   2009 Vol.31 (9): 2247-2251 [Abstract] (2586) [HTML 1 KB] [PDF 237 KB] (1028)
1031 Sun Tian-hao; Zhu Qing-sheng; Li Shuang-qing
  Research on One-to-Many Negotiation Model
    JEIT   2009 Vol.31 (5): 1031-1034 [Abstract] (2292) [HTML 1 KB] [PDF 201 KB] (991)
929 Zhang Rui; Liu Ji-qiang; Zhao Jia
  An ID-based Key Pre-distribution Scheme for Wireless Sensor Networks
    JEIT   2009 Vol.31 (4): 929-932 [Abstract] (2385) [HTML 1 KB] [PDF 219 KB] (888)
2490 Jin Guang, Yang Jian-Gang, Wei Wei, Dong Ya-Bo
  Stateless Filtering Based on Enhanced Capabilities
    JEIT   2008 Vol.30 (10): 2490-2493 [Abstract] (2555) [HTML 1 KB] [PDF 245 KB] (953)
1493 Wu Zhi-Jun;Zhang Dong
  The Approach of Defending Against DoS Attack in Frequency Domain
    JEIT   2008 Vol.30 (6): 1493-1495 [Abstract] (2546) [HTML 1 KB] [PDF 221 KB] (1354)
6 Tie Man-xia①②; Li Jian-dong; Zhang Bian-ling; Huang Zhen-hai
  A Wireless Access Authentication Protocol Suitable for IBSS Networks
    JEIT   2008 Vol.30 (1): 6-9 [Abstract] (3050) [HTML 1 KB] [PDF 212 KB] (1469)
3011 Xiao Yun; Han Chong-zhao; Zheng Qing-hua; Zhao ting
  An Approach to Filter False Positive Alerts Based on RS-SVM Theory
    JEIT   2007 Vol.29 (12): 3011-3014 [Abstract] (2737) [HTML 1 KB] [PDF 233 KB] (1551)
2248 Tian Jun-feng; Wang Hui-ran; Fu Yue
  Research on the Feasibility of TCP/IP Feature Reduction for Intrusion Detection
    JEIT   2007 Vol.29 (9): 2248-2251 [Abstract] (2417) [HTML 1 KB] [PDF 222 KB] (1152)
1215 Wang Kun; Yin Zhong-hai; Zhou Li-hua; Yuan Feng
  Study on Complicated Information System Support Platform
    JEIT   2007 Vol.29 (5): 1215-1219 [Abstract] (2381) [HTML 1 KB] [PDF 295 KB] (1234)
776 Wang Kun; Yin Zhong-hai; Zhou Li-hua; Cai Zhen
  Study on Information System Disaster Recovery Planning
    JEIT   2007 Vol.29 (4): 776-780 [Abstract] (2692) [HTML 1 KB] [PDF 248 KB] (1341)
733 Peng Zhi-ping; Peng Hong; Zheng Qi-lun
  Study on Bilateral and Multi-issue Autonomous Negotiation Model
    JEIT   2007 Vol.29 (3): 733-738 [Abstract] (2528) [HTML 1 KB] [PDF 332 KB] (916)
2378 Xi Guo-bao; Chen Hui-fang; Zhao Wen-dao
  Chinese Remainder Theorem-Based Secret Sharing Scheme
    JEIT   2006 Vol.28 (12): 2378-2381 [Abstract] (2064) [HTML 1 KB] [PDF 212 KB] (1192)
2162 Tian Jun-feng; Zhang Zhe; Zhao Wei-dong
  The Design and Research of Intrusion Detection System Based on Misuse and Anomaly
    JEIT   2006 Vol.28 (11): 2162-2166 [Abstract] (2957) [HTML 1 KB] [PDF 309 KB] (1622)
1492 Zhang Shi-bin①②; He Da-ke; Homare Endo
  Research of Fuzzy Autonomous Trust Establishment Strategy
    JEIT   2006 Vol.28 (8): 1492-1496 [Abstract] (1841) [HTML 1 KB] [PDF 137 KB] (725)
546 Wang Hai-yan; Wang Ru-chuan①②
  The Security Research of Multiple Mobile AgentSystem Based on Secret Splitting
    JEIT   2006 Vol.28 (3): 546-550 [Abstract] (1877) [HTML 1 KB] [PDF 256 KB] (829)
1310 Liu Li;Hu Peng;Li Jin-sheng;Hong Pei-lin
  Secure and Dynamic Tunneling Mechanism of Construction VPN in Dynamic Network
    JEIT   2005 Vol.27 (8): 1310-1314 [Abstract] (1834) [HTML 1 KB] [PDF 212 KB] (853)
First page | Prev page | Next page | Last pagePage 2 of 2, 50 records
     京ICP备05002787号

© 2010 JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY
Institute of Electronics, Chinese Academy of Sciences, P.O.Box 2702, Beijing 100190
Tel: +86-10-58887066 Fax: +86-10- 58887539,Email: jeit@mail.ie.ac.cn

Supported by:Beijing Magtech