[1] |
ZHOU Jingxian, LIU Huiyue, ZHOU Yajian, LYU Zongping.
Blockchain-Oriented Key Management Scheme for Aeronautical Ad Hoc Networks
[J]. Journal of Beijing University of Posts and Telecommunications, 2023, 46(1): 63-68.
|
[2] |
PENG Weiping, HAN Ning, SONG Cheng.
Certificateless Identity Authentication Scheme for Internet of Vehicles in Edge Computing Environment
[J]. Journal of Beijing University of Posts and Telecommunications, 2022, 45(1): 46-51.
|
[3] |
YI Qian, LI Wei, YI Shu-ping, XIE Jun-dong.
Trustworthy Identity Authentication Based on Joint Time-Frequency Analysis of Mouse Behavior
[J]. Journal of Beijing University of Posts and Telecommunications, 2021, 44(4): 121-128.
|
[4] |
LIU Ning-chun, GAO Shuai, HOU Xin-di, GUO Xing-chang.
A Data Access Control Scheme in Information-Centric Mobile Ad Hoc Networks
[J]. Journal of Beijing University of Posts and Telecommunications, 2021, 44(2): 54-60.
|
[5] |
XUE Jian-bin, BAI Zi-mei.
Security and Efficient Authentication Scheme for Mobile Edge Computing
[J]. Journal of Beijing University of Posts and Telecommunications, 2021, 44(1): 110-116.
|
[6] |
LI Tao, ZHANG Jing, YANG Hao.
Analysis and Improvement of Privacy Protection Scheme in VANET
[J]. Journal of Beijing University of Posts and Telecommunications, 2020, 43(1): 104-110.
|
[7] |
SUN Bo, ZHANG Wei, SI Cheng-xiang.
Social Network User Identity Association and Its Analysis
[J]. Journal of Beijing University of Posts and Telecommunications, 2020, 43(1): 122-128.
|
[8] |
SONG Cheng, GU Xin-an, WANG Lei, LIU Zhi-zhong, YAN Xi-xi.
Research on Identity-Based Batch Anonymous Authentication Scheme for Vehicular Network
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2019, 42(5): 69-74.
|
[9] |
MA Bin, MAO Bu-xuan, XIE Xian-zhong.
Vertical Handoff Algorithm for Reducing Congestion in Ad Hoc Heterogeneous Network
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2019, 42(2): 19-24.
|
[10] |
TANG Yong-li, HU Ming-xing, YE Qing, QIN Pan-ke, YU Jin-xia.
Improved Multi-Identity Based Fully Homomorphic Encryption Scheme over Lattices
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2018, 41(1): 125-133.
|
[11] |
BAI Yuan, AN Jie, ZHANG Hui-bing.
Prediction-Aided Routing Protocol in Ad hoc Network
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2017, 40(s1): 29-33.
|
[12] |
LIU Ying, ZHU Si-yan, SUN Chen-hua, LI Guo-yan.
Performance Modeling and Analysis of Multi-Hop Ad Hoc Network under Delay Constraint
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2017, 40(5): 24-29.
|
[13] |
SONG Cheng, ZHANG Ming-yue, PENG Wei-ping, JIA Zong-pu, LIU Zhi-zhong.
Privacy Protection Mechanism Based on Secure Multi-party Computation in VANET
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2017, 40(3): 67-71.
|
[14] |
REN Jian-jun, SHAO Su-jie, GUO Shao-yong, QI Feng.
A Clustering Algorithm with Two-Tier Structure Applied in VANET Network
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2016, 39(s1): 23-26.
|
[15] |
PENG Hai-yun, HOU Yan.
Optimal Energy Consumption of Wireless Ad Hoc Network Using GRASP with Path Relinks
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2015, 38(4): 122-127.
|