[1] |
Wen QIAO, Xiaozheng WANG, Gan REN, Aidong YANG, Shoufeng WANG, Peng WANG, Xiaozhou YE, Ye OUYANG.
An eCUA model for integrated computing power and decentralized digital identity and a new business system supporting information framework
[J]. Telecommunications Science, 2023, 39(4): 152-164.
|
[2] |
Chunlei PENG,Xinbo GAO,Nannan WANG,Jie LI.
Dependable identity recognition and authorization based on visual information
[J]. Telecommunications Science, 2020, 36(11): 1-17.
|
[3] |
Hui YAO,Siyan MA.
Key technologies and application of artificial intelligence in telecom real-name system
[J]. Telecommunications Science, 2019, 35(5): 51-58.
|
[4] |
Boxuan LV,Jingwen LIU,Wei XU,Dan WANG,Wenying NIE,Ming HE.
Mobile office system oriented to intelligent terminal
[J]. Telecommunications Science, 2018, 34(2): 115-121.
|
[5] |
Xun LI,Lin YOU,Jiahao LIANG,Chunhui YAN.
A novel fuzzy vault scheme based on the feature level fusion of fingerprint and face features
[J]. Telecommunications Science, 2018, 34(10): 72-84.
|
[6] |
Jie ZHAO,Huarong ZHANG.
Security authentication protocol based on elliptic curve cryptography and cookie information for terminal of IoT
[J]. Telecommunications Science, 2016, 32(6): 136-142.
|
[7] |
Panxing LI,Jing WANG.
PCI planning method based on genetic algorithm in LTE network
[J]. Telecommunications Science, 2016, 32(3): 147-152.
|
[8] |
Yafei Tang,Yunyong Zhang,Ni Zhang.
Cloud Security Certification Technology Based on Fingerprint Recognition
[J]. Telecommunications Science, 2015, 31(8): 158-164.
|
[9] |
Di Liu,Yunyong Zhang,Ni Zhang,Manjun Zhang.
Research on“Wo Connect”Uniform Authentication Technology
[J]. Telecommunications Science, 2015, 31(6): 6-11.
|
[10] |
Zhaohua Zheng,Jinlian Peng,Jieren Cheng.
Researcb on Application Bidirectional Identity Autbentication Scbeme Based on Mobile Pbone Token
[J]. Telecommunications Science, 2014, 30(9): 87-91.
|
[11] |
Xiaorong Shen.
Discussion on tbe Rules of Services Management Model for Adapting to User Bebaviors
[J]. Telecommunications Science, 2014, 30(9): 145-148.
|
[12] |
Xiaoguang Zhu,Hua Jiang.
Researcb on PCI Self-Configuration Tecbnology of LTE eNB System
[J]. Telecommunications Science, 2014, 30(7): 130-134.
|
[13] |
Chongxia Wang,Meizhen Gao,Qian Liu,Xianwei Zhou.
Design of United Identity Authentication and Key Agreement Protocol for Hybrid Cloud
[J]. Telecommunications Science, 2014, 30(4): 95-99.
|
[14] |
Ying Yu.
Construction of Information Security System of Power Generation Enterprise
[J]. Telecommunications Science, 2014, 30(1): 148-152.
|
[15] |
Qiang Wu,Lin Chen.
Research on Internet Security Model Based on ID/Locator Split Architecture
[J]. Telecommunications Science, 2011, 27(11): 99-104.
|