[1] |
MIRZAEE Siavash, JIANG Letian *(蒋乐天).
Fast Confidentiality-Preserving Authentication for Vehicular Ad Hoc Networks
[J]. Journal of Shanghai Jiao Tong University (Science), 2019, 24(1): 31-40.
|
[2] |
BHASKAR Subbe Gowda1*, SATISH KUMAR Gandluru Arthur Edwin2, RAMANA REDDY Patil3.
Design and Analysis of an Adaptive Handover Protocol for 4G Networks
[J]. Journal of shanghai Jiaotong University (Science), 2015, 20(2): 209-217.
|
[3] |
HE Jing-sha1,2 (何泾沙), XU Chen1* (徐琛), ZHANG Yi-xuan1 (张伊璇), ZHOU Shi-yi2 (周世义).
A Strategy for Middleman Attack Prevention in Remote Desktop Protocol
[J]. Journal of shanghai Jiaotong University (Science), 2015, 20(1): 82-85.
|
[4] |
XIE Qi* (谢 琪), LIU Wen-hao (刘文浩), WANG Sheng-bao (王圣宝),HU Bin (胡 斌), DONG Na (董 娜), YU Xiu-yuan (于秀源).
Robust Password and Smart Card Based Authentication Scheme with Smart Card Revocation
[J]. Journal of shanghai Jiaotong University (Science), 2014, 19(4): 418-424.
|
[5] |
CHEN Lei,ZHU Tianlin,LIU Feng,WANG Wei.
Packet Delay Estimation with Minimum Queue Waiting in Asymmetric Network
[J]. Journal of Shanghai Jiaotong University, 2014, 48(10): 1394-1399.
|
[6] |
ZHANG Yuanqing,LIU Quanli,WANG Wei.
Design and Implementation of a Train Audio Control Unit of the Passenger Information System (PIS) Based on SIP
[J]. Journal of Shanghai Jiaotong University, 2014, 48(07): 1021-1025.
|
[7] |
FU Gui-Tao-1, 2 , ZHAO Tian-Lei-1, TANG Chuan-1, XING Zuo-Cheng-1.
An Adaptive Token Protocol Optimized for Migratory Sharing
[J]. Journal of Shanghai Jiaotong University, 2013, 47(01): 49-54.
|
[8] |
LI Yong-Jin, DENG Rang-Yu, YAN Xiao-Bo, YI Xiao-Fei, ZHOU Hong-Wei, ZHANG Ying.
Design of a 2 GHz L2 Cache for 16-core Processor
[J]. Journal of Shanghai Jiaotong University, 2013, 47(01): 108-112.
|
[9] |
.
Effect of the Influence of Functional Connections in Mental Images on Design Cognition Process
[J]. Journal of Shanghai Jiaotong University, 2011, 45(09): 1299-1303.
|
[10] |
CHEN Ping-a, WANG Chun-Xiang-a, YANG Ming-b, WANG Bing-b.
Design of an Active Safety Collision Avoidance System Based on Adaptive Warning Area
[J]. Journal of Shanghai Jiaotong University, 2011, 45(07): 995-999.
|
[11] |
CHEN Le,CAO Zhenfu.
Approaches to Resisting LengthBased Attack
[J]. Journal of Shanghai Jiaotong University, 2010, 44(07): 968-0974.
|
[12] |
XU Dongxiao,JIANG Lingge,HE Chen.
A Method of Mobility Fast Handover Based on Locator/ID Separation Protocol
[J]. Journal of Shanghai Jiaotong University, 2010, 44(02): 156-0160.
|