[1] |
Chen ZHANG, Hongkai WANG, Dong MAO, Sichen PAN, Shuai ZHAO.
Research and application of 5G lightweight hardware encryption module for power terminals
[J]. Telecommunications Science, 2023, 39(6): 159-169.
|
[2] |
Xinyan FANG, Yanxia ZHANG, Ruilin CUI, Siwei LUO.
Research on technology mechanism used in P2P network video surveillance system
[J]. Telecommunications Science, 2022, 38(12): 152-162.
|
[3] |
Xin SU, Sen WANG, Hongwen YANG, Jing JIN, Qixing WANG.
Faster-than-Nyquist signaling: value and challenges of 6G-oriented applications
[J]. Telecommunications Science, 2021, 37(9): 38-47.
|
[4] |
Zhiyong LIU, Zhongjiang HE, Yilong RUAN, Junfeng SHAN, Chao ZHANG.
Big data security features and operation practices
[J]. Telecommunications Science, 2021, 37(5): 160-169.
|
[5] |
Li SU, Li LU, Xing ZHANG, Chang LIU.
Graph database based security protection mechanism of 5G network data flow
[J]. Telecommunications Science, 2021, 37(4): 28-36.
|
[6] |
Ye OUYANG, Lilei WANG, Aidong YANG, Maulik SHAH, David BELANGER, Tongqing GAO, Leping WEI, Yaqin ZHANG.
Next decade of telecommunications artificial intelligence
[J]. Telecommunications Science, 2021, 37(3): 1-36.
|
[7] |
Qiuyu ZHANG, Yujie SONG.
A dual speech encryption algorithm based on improved Henon mapping and hyperchaotic
[J]. Telecommunications Science, 2021, 37(12): 11-24.
|
[8] |
Xiaojun LIU,Juan WU,Xiaoqing XU.
Big data architecture analysis and data security fusion technology
[J]. Telecommunications Science, 2020, 36(7): 146-155.
|
[9] |
Qing LI.
Study on 5G networking scheme
[J]. Telecommunications Science, 2020, 36(5): 125-137.
|
[10] |
Yanhua LU,Youliang TIAN,Chen LIU.
Multi-server conjunctive keyword searchable encryption scheme based on BDH problem
[J]. Telecommunications Science, 2020, 36(2): 13-23.
|
[11] |
Yuqing ZHONG,Hao WANG,Zebing LIN,Min WANG,Liye CHEN.
Design of multi-key encryption method
[J]. Telecommunications Science, 2020, 36(11): 89-97.
|
[12] |
Zhengfeng ZHANG.
Control research and application of conventional operations without real-time networks
[J]. Telecommunications Science, 2020, 36(1): 127-133.
|
[13] |
Xinyao WENG,Lin YOU,Tingting LAN.
Blockchain-based result-traceable searchable encryption scheme
[J]. Telecommunications Science, 2019, 35(9): 98-106.
|
[14] |
Lin ZHU,Juan ZHAO,Yiting WANG,Junlan FENG,Gchao DEN.
Smart prediction of the complaint hotspot problem in mobile network
[J]. Telecommunications Science, 2019, 35(5): 17-24.
|
[15] |
Yuhao ZHAO,Xiaoguang HAO,Shaobo GENG,Peng LUO,Kun ZHOU,Jialin ZHEN,Yurong MAO.
Security signaling optimization in optical network for smart substation
[J]. Telecommunications Science, 2019, 35(2): 118-124.
|