We don’t have enough information about this author to calculate their statistics. If you think this is an error let us know.
Learn More
A perfect hash function based on smoothing techniques-SmoothPerf is presented in this paper. Each character of a key is smoothed into two smoothed characters using two different smoothing functions. A multi-stage dependency graph is constructed. The degree of vertices in the multi-stage dependency graph of the smoothed key-set is much more evenly(More)
In order to transmit the security of NAS message effectively, a method of NAS(Non-Access-Stratum) security implementation is proposal, according to characters and protocol specification of NAS security. By the design of common standard interface, the communication parameters of the process shall been transferred effectively. At the same time, the UE and the(More)
  • 1