Feng WANG


A Class of Optimal One-Coincidence Frequency-Hopping Sequence Sets with Composite Length
Wenli REN Fang-Wei FU Feng WANG Jian GAO 
Publication:   
Publication Date: 2017/11/01
Vol. E100-A  No. 11  pp. 2528-2533
Type of Manuscript:  LETTER
Category: Communication Theory and Signals
Keyword: 
frequency-hopping sequencemaximum Hamming correlationpower residue theoryinterleaving technique
 Summary | Full Text:PDF(300.2KB)

RPAH: A Moving Target Network Defense Mechanism Naturally Resists Reconnaissances and Attacks
Yue-Bin LUO Bao-Sheng WANG Xiao-Feng WANG Bo-Feng ZHANG Wei HU 
Publication:   
Publication Date: 2017/03/01
Vol. E100-D  No. 3  pp. 496-510
Type of Manuscript:  PAPER
Category: Information Network
Keyword: 
port and address hoppingmoving target defensenetwork securityreconnaissance
 Summary | Full Text:PDF(3.2MB)

Compact Tri-Band MIMO Antenna for LTE/GSM Mobile Handset Application
Lingsheng YANG Tao LI Feng WANG Kuniaki YOSHITOMI 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2016/01/01
Vol. E99-B  No. 1  pp. 177-185
Type of Manuscript:  PAPER
Category: Antennas and Propagation
Keyword: 
LTEGSMMIMO3-D folded IFA
 Summary | Full Text:PDF(6MB)

Using Regional Routing to Improve the Scalability and Security of Inter-Domain Multipath Routing
Bin DAI Feng WANG Baokang ZHAO Jinshu SU 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2012/01/01
Vol. E95-D  No. 1  pp. 94-107
Type of Manuscript:  Special Section PAPER (Special Section on Trust, Security and Privacy in Computing and Communication Systems)
Category: Security
Keyword: 
BGPinter-domain multipath routingnetwork performanceprefix hijacking
 Summary | Full Text:PDF(1.2MB)

An Efficient Square Root Computation in Finite Fields GF(p2d)
Feng WANG Yasuyuki NOGAMI Yoshitaka MORIKAWA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2005/10/01
Vol. E88-A  No. 10  pp. 2792-2799
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Cryptography and Information Security
Keyword: 
square rootfinite fieldsquadratic residue
 Summary | Full Text:PDF(211.2KB)