Skip to main content

and
  1. No Access

    Article

    Tripartite evolutionary game in the process of network attack and defense

    At present, confrontations in cyberspace are becoming increasingly fierce, and network attacks and defenses have become the main form of confrontation between parties in cyberspace. The maximum benefit can be ...

    Zigang Chen, Chaochao Fan, Tao Leng, Long Chen, Yuhong Liu in Telecommunication Systems (2024)

  2. No Access

    Article

    A mutual authentication scheme in VANET providing vehicular anonymity and tracking

    Nowadays, the intelligent transportation system (ITS) has developed prosperously all over the world. As a key technique in ITS, vehicular ad-hoc network (VANET) supports fast transmitting while bringing securi...

    Jiabei He, Xuchong Liu, Fan Wu, Chaoyang Chen, **ong Li in Telecommunication Systems (2022)

  3. No Access

    Article

    A new authentication and key agreement protocol for 5G wireless networks

    Authentication and key agreement (AKA) protocol is an important security mechanism for access services in mobile communication systems. The 3GPP group has standardized the AKA protocol for 5G mobile communicat...

    Tian Liu, Fan Wu, **ong Li, Chaoyang Chen in Telecommunication Systems (2021)

  4. Article

    Foreword to the special issue on intelligent vehicular network and applications

    Jeng-Shyang Pan, Shi-Huang Chen in Telecommunication Systems (2020)

  5. No Access

    Chapter and Conference Paper

    Simulation Research on Core Control Parameters of Electromagnetic Force in Electromagnetic Riveting System

    To achieve effective control of the riveting force in the electromagnetic riveting system and improve riveting efficiency, a theoretical analysis of electromagnetic riveting force is given. The Ansoft Maxwell ...

    Chang Chen, Yi-jian Tao, Zhi-kun Zhu in Proceeding of the 24th International Confe… (2019)

  6. No Access

    Article

    Performance analysis of cellular networks with mobile relays under different modes

    With the popularity of smart phones and tablets, people make intensive use of these devices on public transport. The deployment of mobile relays on public transport may increase the quality of mobile services....

    Yangyang Chen, Feng Yan, Xavier Lagrange in Telecommunication Systems (2017)

  7. No Access

    Article

    RFID-based mobility for seamless personal communication system in cloud computing

    The Voice over Internet Protocol (VoIP) was developed for making telephone calls using an Internet connection instead of a regular (or analog) phone line. However, traditional VoIP technologies have many disad...

    Yi-Wei Ma, Wei-Ting Cho, Jiann-Liang Chen, Yueh-Min Huang in Telecommunication Systems (2015)

  8. No Access

    Article

    Navigation-based self-optimization handover mechanism for mobile relay stations in WiMAX networks

    Organic Computing has similar characteristics of organism which can be self-adjustment for a variety of conditions. Moreover, during the wireless communication technological evolution progress, WiMAX (Worldwid...

    Jian-Ming Chang, Wei-Te Hsiao, Jiann-Liang Chen in Telecommunication Systems (2014)

  9. No Access

    Article

    Communication and organizational social networks: a simulation model

    Recent management research has evidenced the significance of organizational social networks, and communication is believed to impact the interpersonal relationships. However, we have little knowledge on how co...

    Liang Chen, Guy G. Gable, Haibo Hu in Computational and Mathematical Organization Theory (2013)

  10. No Access

    Article

    Implementation of SOPC based Telecom & Datacom for monitoring wireless sensor networks

    In this paper, we used SOPC to develop WSN Control Center to be monitored by Telecom and Datacom. We design the Wireless/Wired Board to receive sensing data from wireless sensor network and through DM9000A Eth...

    Han-Chiang Chen, Y.-M. Huang, Chia-Hung Su, Te-Wei Chiu in Telecommunication Systems (2013)

  11. No Access

    Article

    A new metric model for trustworthiness of softwares

    As people depend more and more on softwares, there has been an increasing demand for the trustworthiness of the software. To measure the trustworthiness of software, we need to design appropriate trustworthy m...

    Hongwei Tao, Yixiang Chen in Telecommunication Systems (2012)

  12. No Access

    Article

    Improving protocol capacity by scheduling random access on WLANs

    The MAC protocol is important, especially for wireless LAN because of limited bandwidth. A great deal of research has been carried out and some of proposed schemes are effective. Specifically, considerable eff...

    Xuejun Tian, **ang Chen, Tetsuo Ideguchi, Takashi Okuda in Telecommunication Systems (2008)

  13. No Access

    Article

    MTRA: An on-line hose-model VPN provisioning algorithm

    Virtual private networks (VPNs) provide customers with a secure and manageable communication environment. The allocation of bandwidth for VPNs to meet the requirements specified by customers is now one of the ...

    Yu-Liang Liu, Yeali S. Sun, Meng Chang Chen in Telecommunication Systems (2006)