Development of IT industry in China in the new age Ze-min Jiang OriginalPaper 11 March 2009 Pages: 1 - 24
Experimental investigation of a cryogenic filter for separating solid carbon dioxide particles from liquid nitrogen Juan LiYu-mei ShiXiang-dong Li OriginalPaper 11 March 2009 Pages: 25 - 28
Experimental investigation of boiling two-phase flow instability of nitrogen in a vertical tube Xiang-dong LiWei WeiYan-hua Yang OriginalPaper 11 March 2009 Pages: 29 - 34
Adsorption models and structural characterization for activated carbon fibers Chuan-juan ChenRu-zhu WangJin-qiang Hu OriginalPaper 11 March 2009 Pages: 35 - 39
Dynamic simulation and performance investigation of no-frost refrigerator: Part I mathematical model Xiu-ping SuJiang-ping ChenXiao-tian Zhou OriginalPaper 11 March 2009 Pages: 40 - 44
Experimental study of the airside performance for interrupted fin-and-tube heat exchanger with hydrophilic coating under dehumidifying conditions Xiao-kui MaGuo-liang DingYuan-ming Zhang OriginalPaper 11 March 2009 Pages: 45 - 51
A mechanical and experimental study on the heat loss of solar evacuated tube Hui-zhong ZhaoZhen-yan LiuZhi-jun Zou OriginalPaper 11 March 2009 Pages: 52 - 57
Thermal management controller for heat source temperature control and thermal management Yi HuangfuJing-yi WuSheng Li OriginalPaper 11 March 2009 Pages: 58 - 63
Experiment on the secondary flow of a large turn angle turbine stator with a rotating single slanted hotwire Jun LiMing Su OriginalPaper 11 March 2009 Pages: 64 - 68
Morphological evolution of a void under thermal and mechanical loads Er-li LiXi ChenZhong-hua Li OriginalPaper 11 March 2009 Pages: 69 - 72
Field emission from carbon nanotube/tin composite Bo ZhaoYa-fei Zhang OriginalPaper 11 March 2009 Pages: 73 - 75
Effect of elastic constitutive laws on the deformation of two-dimensional red blood cell Zhao-xin GongChuan-jing Lu OriginalPaper 11 March 2009 Pages: 76 - 80
Some remarks on the TKIP key mixing function of IEEE 802.11i Wei HanDong ZhengKe-fei Chen OriginalPaper 11 March 2009 Pages: 81 - 85
An identity-based encryption scheme with compact ciphertexts Sheng-li LiuBao-an GuoQing-sheng Zhang OriginalPaper 11 March 2009 Pages: 86 - 89
The gap between intractable problem and adaptive chosen ciphertext security Xian-hui LuXue-jia LaiDa-ke He OriginalPaper 11 March 2009 Pages: 90 - 93
Computer forensic using Lazy Local bagging predictors Wei-dong QiuCheng-yi BaoXing-quan Zhu OriginalPaper 11 March 2009 Pages: 94 - 97
Democratic group signatures with threshold traceability Xiang-xue LiHai-feng QianJian-hua Li OriginalPaper 11 March 2009 Pages: 98 - 101
Distributed certificateless key encapsulation mechanism secure against the adaptive adversary Yu LongXiang-xue LiXuan Hong OriginalPaper 11 March 2009 Pages: 102 - 106
A universal composability framework for analysis of proxy threshold signature Xuan HongXiang-xue LiKe-fei Chen OriginalPaper 11 March 2009 Pages: 107 - 111
Batch secret sharing for secure multi-party computation in asynchronous network Zheng HuangZheng GongQiang Li OriginalPaper 11 March 2009 Pages: 112 - 116
Formal analysis of authentication in 802.11i Ling DongKe-fei ChenXue-jia Lai OriginalPaper 11 March 2009 Pages: 122 - 128