[1] |
Zhenyu WANG, Yang GUO, Shaoqing LI, Shen HOU, Ding DENG.
Design of efficient anonymous identity authentication protocol for lightweight IoT devices
[J]. Journal on Communications, 2022, 43(7): 49-61.
|
[2] |
Yanjing SUN, Fengzhi CHENG, Jiasi ZHOU, Song LI.
Design of fairness-driven RSMA-SDMA precoding
[J]. Journal on Communications, 2022, 43(4): 177-185.
|
[3] |
Jie CUI, Xuefeng CHEN, Jing ZHANG, Lu WEI, Hong ZHONG.
Bus cache-based location privacy protection scheme in the Internet of vehicles
[J]. Journal on Communications, 2021, 42(7): 150-161.
|
[4] |
Yinghui YE,Liqin SHI,Guangyue LU.
User-centric energy efficiency fairness in backscatter-assisted wireless powered communication network
[J]. Journal on Communications, 2020, 41(7): 84-94.
|
[5] |
Zhu WANG,Qingyun YUAN,Fanfan HAO,Liang FANG,Fenghua LI.
Multipath congestion control algorithm based on link capacity
[J]. Journal on Communications, 2020, 41(5): 59-71.
|
[6] |
Weihao LI,Jin CAO,Hui LI.
Privacy self-correlation privacy-preserving scheme in LBS
[J]. Journal on Communications, 2019, 40(5): 57-66.
|
[7] |
Guozhen TAN,Guodong HAN,Fuxin ZHANG,Nan DING,Mingjian LIU.
Distributed congestion control strategy using network utility maximization theory in VANET
[J]. Journal on Communications, 2019, 40(2): 82-91.
|
[8] |
Xuefeng LI,Junwei ZHANG,Jianfeng MA.
UCAP:a PCL secure user authentication protocol in cloud computing
[J]. Journal on Communications, 2018, 39(8): 94-105.
|
[9] |
Lei ZHANG,Chun-guang MA,Song-tao YANG,Zeng-peng LI.
CP-ABE based users collaborative privacy protection scheme for continuous query
[J]. Journal on Communications, 2017, 38(9): 76-85.
|
[10] |
Zhuo-xiong PEI,Xing-hua LI,Hai LIU,Kai-yue LEI,Jian-feng MA,Hui LI.
Anonymizing region construction scheme based on query range in location-based service privacy protection
[J]. Journal on Communications, 2017, 38(9): 125-132.
|
[11] |
Xiao-tong FU,Si CHEN,Ning ZHANG.
Proxy-cryptocurrency payment system
[J]. Journal on Communications, 2017, 38(7): 199-206.
|
[12] |
En ZHANG,Kui GENG,Wei JIN,Yong-jun LI,Yun-qing SUN,Feng-hua LI.
Cloud outsourcing secret sharing scheme against covert adversaries
[J]. Journal on Communications, 2017, 38(5): 57-65.
|
[13] |
Cheng-long SU,Guang JIN,Xian-liang JIANG,Jun NIU.
Active queue management algorithm focusing on fairness and low delay
[J]. Journal on Communications, 2017, 38(5): 199-206.
|
[14] |
Xian-zhong XIE,Hua-bing LU,Zhao-yuan SHI.
Fair and efficient opportunistic interference alignment algorithm based on round-robin scheduling
[J]. Journal on Communications, 2017, 38(10): 1-9.
|
[15] |
Yong CAO,Zhen YANG,You-hong FENG.
New NOMA power allocation strategy
[J]. Journal on Communications, 2017, 38(10): 157-165.
|