ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Study of network time synchronisation security strategy based on polar coding
Computers & Security
◽
10.1016/j.cose.2021.102214
◽
2021
◽
Vol 104
◽
pp. 102214
Author(s):
Ting He
◽
Yong Zheng
◽
Zherui Ma
Keyword(s):
Security Strategy
◽
Polar Coding
◽
Network Time
Download Full-text
Related Documents
Cited By
References
Challenges in Time Transfer using the Network Time Protocol (NTP)
Proceedings of the 47th Annual Precise Time and Time Interval Systems and Applications Meeting
◽
10.33012/2017.14978
◽
2017
◽
Cited By ~ 3
Author(s):
Steven E. Sommars
Keyword(s):
Time Transfer
◽
Network Time
◽
Network Time Protocol
Download Full-text
POULTRY FARMING DEVELOPMENT IS AS THE INSTRUMENT OF REALIZATION OF FOOD SECURITY STRATEGY IN REGIONS
AIC economics management
◽
10.33305/185-83
◽
2018
◽
pp. 83-90
Author(s):
A. Efremova
Keyword(s):
Food Security
◽
Security Strategy
◽
Poultry Farming
Download Full-text
Characteristics of cyberspace, cyber terrorism, and the change of cyber security strategy
Gachon Law Review
◽
10.15335/glr.2018.11.4.009
◽
2018
◽
Vol 11
(4)
◽
pp. 251-284
Author(s):
Minwoo Yun
◽
Keyword(s):
Cyber Security
◽
Security Strategy
◽
Cyber Terrorism
Download Full-text
HIGHER ORDER MODULATION EFFECTS ON 5G NR DOWNLINK USING CYCLIC REDUNDANCY CHECK-AIDED POLAR CODING TECHNIQUE
Telecommunications and Radio Engineering
◽
10.1615/telecomradeng.v79.i20.20
◽
2020
◽
Vol 79
(20)
◽
pp. 1785-1800
Author(s):
R. Dilli
Keyword(s):
Higher Order
◽
Cyclic Redundancy Check
◽
Polar Coding
Download Full-text
Issues of economic security and public administration in terms of Russia's economic security strategy
National Interests Priorities and Security
◽
10.24891/ni.16.1.60
◽
2020
◽
Vol 16
(1)
◽
pp. 60-79
◽
Cited By ~ 1
Author(s):
O.A. Vasilenko
◽
Keyword(s):
Public Administration
◽
Economic Security
◽
Security Strategy
Download Full-text
Security Strategy for the Russian Financial and Economic System: Problems and the Ways of Solution
Economic Strategies
◽
10.33917/es-7.165.2019.134-141
◽
2019
◽
Vol 144
(7)
◽
pp. 134-141
Author(s):
Victor I. Latyshev
◽
Keyword(s):
Economic System
◽
Security Strategy
Download Full-text
Network time protocol performance evaluation in LAN environment
Journal of Computer Applications
◽
10.3724/sp.j.1087.2012.00943
◽
2013
◽
Vol 32
(4)
◽
pp. 943-945
Author(s):
Chao-fu CHEN
◽
Lei WANG
Keyword(s):
Performance Evaluation
◽
Network Time
◽
Protocol Performance
◽
Network Time Protocol
Download Full-text
National Security Strategy: The Counternarcotics Effort Revisited 1991
10.21236/ada233869
◽
1991
◽
Author(s):
Jr Portante
◽
Guido
Keyword(s):
National Security
◽
Security Strategy
◽
National Security Strategy
Download Full-text
Clausewitz's 'Remarkable Trinity': National Security Strategy and Presidential Command and Control of the Armed Forces
10.21236/ada280659
◽
1994
◽
Author(s):
G. S. Hartley
Keyword(s):
National Security
◽
Command And Control
◽
Armed Forces
◽
Security Strategy
◽
National Security Strategy
◽
And Control
Download Full-text
The Spratly Island Dispute. A Case for a New U.S. Southeast Asia Security Strategy.
10.21236/ada308522
◽
1996
◽
Author(s):
Stephen P. Ham
◽
Jr
Keyword(s):
Southeast Asia
◽
Security Strategy
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close