[1] |
Fuyuan CHEN, Zhenjiang DONG, Jiankuo DONG, Minjie XU.
A survey of V2X security protection technologies
[J]. Telecommunications Science, 2023, 39(3): 1-15.
|
[2] |
Zhongping WU, Lujie WANG, Jianuo XU, Yanbo WANG, Liwei ZHANG.
Application research of distribution network based on quantum secure communication and 5G hard-slicing private network
[J]. Telecommunications Science, 2022, 38(1): 159-169.
|
[3] |
Xiaohui YAO,Qing LI,Kunkun SUN.
A domain adaptive hybrid genetic algorithm and its verification in security service function chain orchestration
[J]. Telecommunications Science, 2020, 36(5): 16-24.
|
[4] |
Daoyuan LIU,Keda SUN,Junliang ZHOU,Haidong FAN.
Application of fuzzy comprehensive evaluation method in network information security assessment of electric power enterprises
[J]. Telecommunications Science, 2020, 36(3): 34-41.
|
[5] |
Yuqing ZHONG,Hao WANG,Zebing LIN,Min WANG,Liye CHEN.
Design of multi-key encryption method
[J]. Telecommunications Science, 2020, 36(11): 89-97.
|
[6] |
Yuan ZHANG,Huifen WANG,Hanming WANG.
Machine vision technology,standardization,and application in safety industry
[J]. Telecommunications Science, 2020, 36(11): 104-112.
|
[7] |
Xiaoyin XI,Xiaoyun YUAN.
Practice analysis of domestic and foreign industry benchmarking enterprises in the field of network and information security
[J]. Telecommunications Science, 2020, 36(11): 134-140.
|
[8] |
Jiye WANG,Liang SHEN,Linxin WANG,Chengyue YANG.
Design and implementation of synchronous line loss electricity consumption information collection system based on Beidou technology
[J]. Telecommunications Science, 2019, 35(3): 107-115.
|
[9] |
Jing WANG,Kunlun GAO,Bo ZHANG.
Research and design in dual network scheme of power corporation based on network isolation and secure data exchange
[J]. Telecommunications Science, 2017, 33(2): 163-176.
|
[10] |
Jie LI.
Introduction and critical technology analysis of internet of vehicle
[J]. Telecommunications Science, 2016, 32(8): 34-38.
|
[11] |
Ying XU,Zhao WU,Zhiqi LI.
Perception technology of virtual threat for large enterprise's information security construction
[J]. Telecommunications Science, 2016, 32(12): 149-156.
|
[12] |
Jia Wu,Dan Su,Wang Li,Weiguo Yuan,Rui Yang.
Construction and Application for Operation-BusinessOriented Mobile GIS Service Platform
[J]. Telecommunications Science, 2015, 31(6): 132-136.
|
[13] |
Di Liu,Yunyong Zhang,Ni Zhang,Manjun Zhang.
Research on“Wo Connect”Uniform Authentication Technology
[J]. Telecommunications Science, 2015, 31(6): 6-11.
|
[14] |
Yexia Cheng,Yuejin Du,Kai Yang,Shen He,Jin Peng,Wen Jiang.
A Novel Secret Sharing Method Based on Binary Sequence
[J]. Telecommunications Science, 2015, 31(11): 23-29.
|
[15] |
Xiaofeng Liu,Bin Tan,Lan Qiu,Huanru Wang.
Automatic Verification Analysis Technology of Network Security Domain
[J]. Telecommunications Science, 2015, 31(1): 171-175.
|