[1] |
LI Zhaobin, ZHANG Lu, ZHAO Hong, WEI Zhanzhen.
Certificateless Threshold-Based Conditional Proxy Re-Encryption Scheme
[J]. Journal of Beijing University of Posts and Telecommunications, 2023, 46(1): 44-49,83.
|
[2] |
ZHU De-qing, TIAN Xian-zhong, LUAN Shen-ji.
PMIPv6 Performance Modeling and Analysis under the Scenario of Multi-Mobile Node's Simultaneous Handoff
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2019, 42(4): 43-49.
|
[3] |
CHEN Hong-song, SHEN Qiang-lei.
Attribute-Based Encryption Scheme With High Efficient Revocation in Cloud Computing Environment
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2018, 41(3): 113-118.
|
[4] |
CHEN Dan-wei, WU Qiong, CHEN Lin-ling, PAN Su.
Attribute-Based Encryption without Central Authority: DMA-ABE
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2015, 38(5): 77-80.
|
[5] |
ZHANG Qi-zhi, RAO Liang, CHEN Yuan, HU Xue-cong.
Partially Distributed Mobility Management for Proxy Mobile IPv6
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2014, 37(6): 28-33.
|
[6] |
JIANG Ming-ming, HU Yu-pu, WANG Bao-cang, WANG Feng-he, LAI Qi-qi.
Efficient Proxy Signature over Lattices
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2014, 37(3): 89-92.
|
[7] |
HUANG Qin-long, MA Zhao-feng, FU Jing-yi, NIU Xin-xin.
Authorization Protocol of Multimedia Digital Rights Management Based on Proxy Re-Encryption
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2013, 36(6): 7-12.
|
[8] |
ZHAO Chen, SUN Bin, YANG Yi-xian, YANG Yan.
An Improved BGP Security Mechanism
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2012, 35(6): 87-91.
|
[9] |
.
Cryptanalysis and Improvement of a Certificateless Strong Proxy Signature Scheme
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2011, 34(5): 115-118.
|
[10] |
.
Extended Proxy MultiParty Computation and Its Protocol
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2011, 34(4): 118-121.
|
[11] |
.
The Cost Analysis of Proxy Mobile IPv6 and Adaptive Optimization
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2010, 33(5): 56-60.
|
[12] |
SUN Shi-feng;WEN Qiao-yan.
An Attack on a Certificateless Strong Proxy Signature Scheme and Its Improvement
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2010, 33(1): 80-83.
|
[13] |
DU Hong-zhen1.2, WEN Qiao-yan1, LI Wen-min1, JIN Zheng-ping1.
Efficient Certificateless Strong Proxy Signature Scheme
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2008, 31(6): 18-21.
|
[14] |
XU Guo-sheng1, GU Li-ze1, YANG Yi-xian1, Zhou Xi-zeng2 .
New Designated Receiver Proxy Signature Scheme
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2008, 31(4): 42-45.
|
[15] |
ZHOU Liang1, ZHANG Wen-zhong2,YANG Yi-xian1.
Proxy Signature Scheme with Restricted Signing Capability
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2008, 31(3): 103-106.
|