[2] Cheng Yong, Wang Zhiying, Ma Jun. Efficient revocation in ciphertext-policy attribute-based encryption based cryptographic cloud storage[J]. Journal of Zhejiang University-Science C , 2014, 2(5): 85-97.
[3] Dong Xiaojun, Wang Lei, Zuo Ke. A novel block encryption scheme based on chaos and an S-box for wireless sensor networks[J]. Chinese Physics B , 2013, 2(15): 175-186.
[4] Yuan Y, Zuo Z, Guan Y. LTE-Advanced coverage enhancements[J]. JEEE Communications Magazine , 2014, 52(10): 1310-1318.
[5] Niu Tao, Zhuang Yi. Reliable data transmission scheme based on network coding in wireless sensor network[J]. Journal of Advanced Materials Research , 2014, 39(12): 339-342.
[6] Ren Zhenbo, Su Ping, Ma Jianshe. Secure and noise-free holographic encryption with a quick-response code[J]. Chinese Optics Letters , 2014, 12(1): 9-12.
[7] Ye Tianyu. Quantum secure dialogue with quantum encryption[J]. Communications in Theoretical Physics , 2014, 62(9): 338-342.
[12] Wang Qian, Xu Kaihe, Ren Kui. Cooperative secret key generation from phase estimation in narrowband fading channels[J]. IEEE Journal on Selected Areas in Communications , 2013, 30(9): 1666-1674.
[13] He Yishan, Chen Yufang, Wu Ang. Performance analysis of FFH / BPSK system with partial band noise jamming and channel estimation error in high-mobility wireless communication scenarios[J]. Chinese Science Bulletin , 2014, 35(8): 5011-5018.