[1] |
KANG Haiyan, ZHANG Shasha.
Cloud Storage and Blockchain Collaborative Access Control Method for Industrial Internet Data Sharing
[J]. Journal of Beijing University of Posts and Telecommunications, 2023, 46(3): 56-61.
|
[2] |
YANG Hua, GENG Xuan, KONG Ning.
A MAC Protocol for Wireless Networks Using Dueling-DDQN Algorithm
[J]. Journal of Beijing University of Posts and Telecommunications, 2023, 46(3): 25-30.
|
[3] |
LI Zhaobin, ZHANG Lu, ZHAO Hong, WEI Zhanzhen.
Certificateless Threshold-Based Conditional Proxy Re-Encryption Scheme
[J]. Journal of Beijing University of Posts and Telecommunications, 2023, 46(1): 44-49,83.
|
[4] |
LIU Yang, PENG Mu-gen.
Satellite-Ground Fusion Intelligent Networking: Vision and Key Technologies
[J]. Journal of Beijing University of Posts and Telecommunications, 2021, 44(6): 1-12.
|
[5] |
LIU Ning-chun, GAO Shuai, HOU Xin-di, GUO Xing-chang.
A Data Access Control Scheme in Information-Centric Mobile Ad Hoc Networks
[J]. Journal of Beijing University of Posts and Telecommunications, 2021, 44(2): 54-60.
|
[6] |
WANG Zheng, LI Ling, LI Na.
Access Control Scheme Supporting Userand Attribute Revocation in Fog Computing
[J]. Journal of Beijing University of Posts and Telecommunications, 2020, 43(6): 88-95.
|
[7] |
ZHAO Bin, HE Jing-sha, ZHANG Yi-xuan, JI Xin-rong, XUAN Xing-gang.
Knowledge Discovery of Authorization Rule Based on Rough Set in Trust Based Access Control
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2016, 39(2): 48-52.
|
[8] |
BAI Lei, FENG Zhen-xing, TIAN Li-qin.
CDMA Based MAC Protocol for Underwater Sensor Networks
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2015, 38(s1): 107-110.
|
[9] |
CHEN Dan-wei, WU Qiong, CHEN Lin-ling, PAN Su.
Attribute-Based Encryption without Central Authority: DMA-ABE
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2015, 38(5): 77-80.
|
[10] |
XIE Li-xia, BO Fu-kuan, DENG Qiang.
Multi-Domain Role Trust Access Control Model
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2014, 37(3): 83-88.
|
[11] |
LIU Xing, YUAN Chao-wei, YANG Zhen, HU Zhong-wei.
User Handoff and Access Control Based on Mobile Agent in Mobile Cloud Computing
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2014, 37(2): 88-92.
|
[12] |
HUANG Qin-long, MA Zhao-feng, FU Jing-yi, NIU Xin-xin.
Authorization Protocol of Multimedia Digital Rights Management Based on Proxy Re-Encryption
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2013, 36(6): 7-12.
|
[13] |
ZHANG Guo-bin, LI Ming, KE Fen.
Dynamic Subcarrier Allocation Transferring Access Probability in Cognitive Radio System
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2012, 35(6): 78-82.
|
[14] |
FAN Yan-fang, CAI Ying, GENG Xiu-hua.
A Mandatory Access Control Model with Temporal and Spatial Constraints
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2012, 35(5): 111-114.
|
[15] |
.
Cooperative Hybrid Leader Based Protocol for Multicast Error Control in WLANs
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2012, 35(2): 121-125.
|