column
A Survey on Quantum Cryptography
LI Jian, LI Na, ZHANG Yu, WEN Shuang, DU Wei, CHEN Wei, MA Wenping
2018, 27(2): 223-228. DOI: 10.1049/cje.2018.01.017
Abstract PDF
A Restricted Quantum Deniable Authentication Protocol Based on GHZ States
SHI Weimin, WANG Yanmei, LI Leilei, ZHOU Yihua, YANG Yuguang, JIANG Nan
2018, 27(2): 229-233. DOI: 10.1049/cje.2018.01.001
Abstract PDF
Security Analysis of Stochastic Routing Scheme in Grid-Shaped Partially-Trusted Relay Quantum Key Distribution Network
LIU Xingtong, WANG Jian, LI Ruilin, ZHANG Chen
2018, 27(2): 234-240. DOI: 10.1049/cje.2018.01.013
Abstract PDF
Fair Efficiency Comparisons of Decoy-State Quantum Key Distribution Protocols
LI Hongxin, GAO Ming, YAN Xueping, YAN Bao, HAN Yu, SHAN Ling, MA Zhi
2018, 27(2): 241-249. DOI: 10.1049/cje.2017.07.011
Abstract PDF
An Improved Polar Codes-Based Key Reconciliation for Practical Quantum Key Distribution
YAN Shiling, WANG Jindong, FANG Junbin, JIANG Lin, WANG Xuan
2018, 27(2): 250-255. DOI: 10.1049/cje.2017.07.006
Abstract PDF
Quantum Private Query Protocol Based on EPR Pairs
CHANG Yan, XIONG Jinxin, GAO Xiang, ZHANG Shibin, YAN Lili
2018, 27(2): 256-262. DOI: 10.1049/cje.2018.01.016
Abstract PDF
Fault-Tolerant Controlled Quantum Dialogue Using Logical Qubit
XIAO Min, LIU Guang
2018, 27(2): 263-269. DOI: 10.1049/cje.2018.01.015
Abstract PDF
Authenticated Quantum Dialogue Without Information Leakage
WANG He, ZHANG Yuqing, WU Gaofei, MA Hua
2018, 27(2): 270-275. DOI: 10.1049/cje.2018.01.010
Abstract PDF
Deterministic Quantum Secure Direct Communication and Authentication Protocol Based on W-Class State
LI Leilei, ZHANG Yu, WEN Shuang, LI Na, YANG Jiayu, LI Jian
2018, 27(2): 276-280. DOI: 10.1049/cje.2017.10.006
Abstract PDF
Application of Orthogonal Array and Walsh Transform in Resilient Function
PANG Shanqi, WANG Jing, WANG Xunan, WANG Xiaoli
2018, 27(2): 281-286. DOI: 10.1049/cje.2017.09.011
Abstract PDF
On the Cross-Correlation Distribution of d-Ary Generalized Legendre-Sidelnikov Sequences
KE Pinhui, YE Zhifan, ZHANG Shengyuan, CHANG Zuling
2018, 27(2): 287-291. DOI: 10.1049/cje.2017.12.004
Abstract PDF
Cryptanalysis of an Encryption Scheme Using Matrices over Finite Fields
HUANG Huawei, DENG Lunzhi, LI Chunhua, PAN Chunhua
2018, 27(2): 292-296. DOI: 10.1049/cje.2017.07.007
Abstract PDF
An Identity-Based Proxy Signature on NTRU Lattice
ZHU Hongfei, TAN Yu'an, YU Xiao, XUE Yuan, ZHANG Qikun, ZHU Liehuang, LI Yuanzhang
2018, 27(2): 297-303. DOI: 10.1049/cje.2017.09.008
Abstract PDF
Designated Cloud Server Public Key Encryption with Keyword Search from Lattice in the Standard Model
ZHANG Xiaojun, XU Chunxiang, XIE Run, JIN Chunhua
2018, 27(2): 304-309. DOI: 10.1049/cje.2018.01.012
Abstract PDF
A Collaboration-Based Scheme for Location-Based Services with Incentive Mechanism
WAN Sheng, HUA Jiafeng, ZHU Hui, WANG Hanyi, LI Fenghua
2018, 27(2): 310-317. DOI: 10.1049/cje.2017.12.001
Abstract PDF
Modelling of Microburst Based on the Slanted Vortex-Ring Model
LIN Lianlei, LI Xilin, WANG Gang
2018, 27(2): 318-323. DOI: 10.1049/cje.2017.11.005
Abstract PDF
Tissue P Systems with Cooperating Rules
LIU Xiyu, ZHAO Yuzhen, SUN Wenxing
2018, 27(2): 324-333. DOI: 10.1049/cje.2018.01.005
Abstract PDF
Microblog Topic Mining Based on FR-DATM
LIU Bingyu, WANG Cuirong, WANG Yiran, ZHANG Kun, WANG Cong
2018, 27(2): 334-341. DOI: 10.1049/cje.2017.12.006
Abstract PDF
Performance Evaluation and Optimization of Hierarchical Routing in SDN Control Plane
HU Jie, LIN Chuang, ZHANG Puheng
2018, 27(2): 342-350. DOI: 10.1049/cje.2017.09.022
Abstract PDF
An Improved Biogeography-Based Optimization Algorithm for Blocking Flow Shop Scheduling Problem
LIU Shufen, WANG Pengfei, ZHANG Jiachen
2018, 27(2): 351-358. DOI: 10.1049/cje.2018.01.007
Abstract PDF
Hierarchical Layout Deduction for Furniture Model Retrieval
PAN Wanbin, LI Shi, WANG Yigang, JI Zhongping
2018, 27(2): 359-366. DOI: 10.1049/cje.2018.01.014
Abstract PDF
A Linear-Time Solution for All-SAT Problem Based on P System
GUO Ping, ZHU Jian, CHEN Haizhu, YANG Ruilong
2018, 27(2): 367-373. DOI: 10.1049/cje.2018.01.008
Abstract PDF
Single Image Interpolation Using Texture-Aware Low-Rank Regularization
GAO Zhirong, DING Lixin, XIONG Chengyi
2018, 27(2): 374-380. DOI: 10.1049/cje.2017.08.025
Abstract PDF
Investigation on Measurement of Size and Concentration of Solid Phase Particles in Gas-Solid Two Phase Flow
WANG Yueming, LYU Xiaoqi, LI Wentao, YAO Guodong, BAI Junyuan, BAO An
2018, 27(2): 381-385. DOI: 10.1049/cje.2017.12.005
Abstract PDF
Sparse Reconstruction Method for DOA Estimation Based on Dynamic Dictionary and Negative Exponent Penalty
QIAN Tong, CUI Wei, SHEN Qing
2018, 27(2): 386-392. DOI: 10.1049/cje.2017.08.016
Abstract PDF
Speech Magnitude Spectrum Reconstruction from MFCCs Using Deep Neural Network
JIANG Wenbin, LIU Peilin, WEN Fei
2018, 27(2): 393-398. DOI: 10.1049/cje.2017.09.018
Abstract PDF
Chronological Video Synopsis via Events Rearrangement Optimization
HE Yi, HAN Jun, SANG Nong, QU Zhiguo, GAO Changxin
2018, 27(2): 399-404. DOI: 10.1049/cje.2016.11.002
Abstract PDF
A Novel Unsupervised Two-Stage Technique in Color Image Segmentation
LONG Peng, LU Huaxiang, WANG An
2018, 27(2): 405-412. DOI: 10.1049/cje.2018.01.011
Abstract PDF
A Sensor Redeployment Algorithm Based on Virtual Forces for Underwater Sensor Networks
JIANG Peng, WANG Xingmin, LIU Jun
2018, 27(2): 413-421. DOI: 10.1049/cje.2017.10.003
Abstract PDF
A Robust Signal Driven Method for GNSS Signals Interference Detection
LANG Rongling, SU Zhen, ZHOU Kai, MOU Shouxian
2018, 27(2): 422-427. DOI: 10.1049/cje.2018.01.018
Abstract PDF
A Reconfigurable Hardware Architecture for Packet Processing
DUAN Tong, LAN Julong, HU Yuxiang, LIU Shiran
2018, 27(2): 428-432. DOI: 10.1049/cje.2017.08.018
Abstract PDF
Continuous-Variable Quantum Key Distribution Scheme with Odd Coherent States
DONG Yingdi, PENG Jinye, SUN Xiaoyan
2018, 27(2): 433-438. DOI: 10.1049/cje.2017.10.005
Abstract PDF
Optimization of Information Interaction Protocols in Cooperative Vehicle-Infrastructure Systems
ZHANG Yuzhuo, CAO Yuan, WEN Yinghong, LIANG Liang, ZOU Feng
2018, 27(2): 439-444. DOI: 10.1049/cje.2017.10.009
Abstract PDF