[1] |
WU Xuan, JI Weifeng, WENG Jiang, LI Yingqi, SHEN Xiuyu.
Certificateless Handover Authentication and Key Agreement Protocol for Network Slicing
[J]. Journal of Beijing University of Posts and Telecommunications, 2023, 46(4): 103-108.
|
[2] |
Lü Boyu, ZHANG Jie.
Internal Attack Analysis of Quantum Key Agreement Protocol Based on Quantum Search Algorithm
[J]. Journal of Beijing University of Posts and Telecommunications, 2022, 45(3): 64-68,80.
|
[3] |
SHI Zicheng, LI Xin, TANG Ying, HUANG Shanguo.
Optical Packet Filtering System Based on All-Optical Pattern Matching
[J]. Journal of Beijing University of Posts and Telecommunications, 2022, 45(3): 96-101.
|
[4] |
YANG Hongyu, YUAN Haihang, ZHANG Liang.
A Risk Assessment Method of Network Host Node with Host Importance
[J]. Journal of Beijing University of Posts and Telecommunications, 2022, 45(2): 16-21.
|
[5] |
PENG Weiping, HAN Ning, SONG Cheng.
Certificateless Identity Authentication Scheme for Internet of Vehicles in Edge Computing Environment
[J]. Journal of Beijing University of Posts and Telecommunications, 2022, 45(1): 46-51.
|
[6] |
YI Qian, LI Wei, YI Shu-ping, XIE Jun-dong.
Trustworthy Identity Authentication Based on Joint Time-Frequency Analysis of Mouse Behavior
[J]. Journal of Beijing University of Posts and Telecommunications, 2021, 44(4): 121-128.
|
[7] |
XUE Jian-bin, BAI Zi-mei.
Security and Efficient Authentication Scheme for Mobile Edge Computing
[J]. Journal of Beijing University of Posts and Telecommunications, 2021, 44(1): 110-116.
|
[8] |
LI Tao, ZHANG Jing, YANG Hao.
Analysis and Improvement of Privacy Protection Scheme in VANET
[J]. Journal of Beijing University of Posts and Telecommunications, 2020, 43(1): 104-110.
|
[9] |
WANG Ren-zhong, TAO Dan.
Implicit Authentication Mechanism Based on Context Awareness for Smartphone
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2019, 42(6): 118-125.
|
[10] |
SONG Cheng, GU Xin-an, WANG Lei, LIU Zhi-zhong, YAN Xi-xi.
Research on Identity-Based Batch Anonymous Authentication Scheme for Vehicular Network
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2019, 42(5): 69-74.
|
[11] |
XIAO Jian, LI Wen-jiang, GENG Hong-yang, ZHAI Ying-bo.
An Anti-DoS Attack RFID Security Authentication Protocol in the Internet of Vehicles
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2019, 42(2): 114-119.
|
[12] |
ZHANG Jun-song, ZHANG Qi-kun, GAN Yong, MENG Ying-hui.
A New Authentication Protocol for Wireless Medical Sensor Network
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2018, 41(4): 104-109.
|
[13] |
SHI Le-yi, CUI Yu-wen, FU Wen-jing, CHEN Hong-long.
A Lightweight Anonymous Authentication and Key Negotiation Scheme for Clustered WSN
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2018, 41(2): 21-26.
|
[14] |
TANG Hong-wei, FENG Sheng-zhong, ZHAO Xiao-fang.
TOChain: a High-Performance SFC for Virtual Network Security
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2018, 41(1): 70-80.
|
[15] |
YAO Su, GUAN Jian-feng, PAN Hua, ZHANG Hong-ke.
Provably Secure Three-Elements Peer Access Authentication Protocol in Identifier/Locator Separation Network
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2017, 40(s1): 58-62.
|