[1] |
YU Xin, XU Zhengguang.
Hidden Voice Transmission Scheme Based on SSB Modulation
[J]. Journal of Applied Sciences, 2019, 37(5): 643-650.
|
[2] |
YUAN Hong-lin, LU Xiao-dan, XU Chen.
Estimation of Broadband Communication Transmitter Fingerprints Based on B-Spline Neural Network
[J]. Journal of Applied Sciences, 2019, 37(1): 12-23.
|
[3] |
SHEN Xuan, ZHAO Guang-yao, LI Chao, LI Rui-lin.
Differential Fault Analysis on Encryption Mode of MD5
[J]. Journal of Applied Sciences, 2015, 33(5): 481-490.
|
[4] |
CUI Chen, LIANG Hao, YU Jian.
Joint DOD and DOA Estimation with High Accuracy in Bistatic MIMO Radar Using Sparse Array
[J]. Journal of Applied Sciences, 2015, 33(5): 527-540.
|
[5] |
CHEN Chi-yang1,2, DENG Zhi-xiang1, WANG Bao-yun2,3.
Optimal Relay Function and Achievable Secrecy Rate in Orthogonal Relay-Eavesdropper Channel
[J]. Journal of Applied Sciences, 2014, 32(2): 119-124.
|
[6] |
WEI Yong-zhuang 1,2, SU Chong-mao1, MA Chun-bo1.
New Attacks on a Variant ARIA Cipher
[J]. Journal of Applied Sciences, 2013, 31(6): 650-655.
|
[7] |
ZHANG Peng1, FU Shao-jing2, QU Long-jiang1, LI Chao1;2.
Enumeration of Balanced Rotation-Symmetric Boolean Functions
[J]. Journal of Applied Sciences, 2012, 30(1): 45-51.
|
[8] |
CAO Dong1;2, SONG Yao-liang1.
Multi-party Quantum Covert Communication with Entanglement Private-Keys
[J]. Journal of Applied Sciences, 2012, 30(1): 52-58.
|
[9] |
CHEN Ying, WANG Bao-yun.
Achievable Secrecy Rate of Multiple-Level Relay-Eavesdropper Channel
[J]. Journal of Applied Sciences, 2011, 29(3): 243-250.
|
[10] |
LI Ping1, LI Chao1;2, ZHOU Yue1.
Weight Distributions of Linear Codes from Perfect Nonlinear Functions of Dembowski-Ostrom Type
[J]. Journal of Applied Sciences, 2010, 28(5): 441-446.
|
[11] |
YUAN Hong-lin HU Ai-qun;CHEN Kai-zhi.
Uniqueness of Radio Frequency Fingerprint
[J]. Journal of Applied Sciences, 2009, 27(1): 1-5 .
|
[12] |
JI Xiao-jun, TIAN Chang, ZHANG Yu-sen.
Security Analysis of MANET Routing Protocol
[J]. Journal of Applied Sciences, 2007, 25(1): 30-34.
|
[13] |
LI Qing-ling, LI Chao.
Safety of Variant Camellia against Square Attack
[J]. Journal of Applied Sciences, 2006, 24(5): 485-490.
|
[14] |
YUAN Dan-shou, RONG Meng-tian, LI Xin-tian.
Serial Circuit Architecture for Power-Sum in GF(2m)
[J]. Journal of Applied Sciences, 2006, 24(2): 111-114.
|
[15] |
HUANG Yu-hua, HU Ai-qun, SONG Yu-bo.
A Study on the One-Time Pad Algorithm & Its Implementation
[J]. Journal of Applied Sciences, 2004, 22(3): 287-290.
|