[1] |
LEI Wei-jia, SHENG Jie, XIE Xian-zhong.
Encoding and Decoding Scheme of Security-Enhanced LT Codes
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2016, 39(4): 108-113.
|
[2] |
YANG Hong-yu, CHENG Xiang.
Information System Risk Control Method Based on Work-Flow
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2016, 39(3): 105-109.
|
[3] |
GE Hai-hui, ZHENG Shi-hui, CHEN Tian-ping, YANG Yi-xian.
Fuzzy Risk Assessment of Information Security Threat Scenario
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2013, 36(6): 89-92,107.
|
[4] |
YANG Bo, XIAO Zi-bi.
Efficient Certificate-Based Signature Scheme
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2012, 35(5): 73-76.
|
[5] |
QIN Hua-wang;DAI Yue-wei;WANG Zhi-quan.
Threshold Signature Scheme Based on the General Access Structure
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2009, 32(6): 102-104.
|
[6] |
LuZhenbang,ZHOU Bo.
Hierarchical Risk Assessment Based on Shapley Entropies and Choquet Integrals
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2009, 32(6): 83-87.
|
[7] |
LEI Xin-Feng.
Implement of Chinese-Wall Model Based on an Open Synthetical Security Model
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2009, 32(3): 73-76.
|
[8] |
XU Guo-ai1, ZHANG Miao1, CHEN Ai-guo1, LI Zhong-xian2 .
An Integer Overflow Detection Method Based on Integer Variable Unification
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2008, 31(6): 90-93.
|
[9] |
LI Da-lin, LIN Xue-hong, LIN Jia-ru, WU Wei-ling.
A Necessary Condition for Secure Network Coding
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2008, 31(5): 9-12.
|
[10] |
ZHANG Hong-qi, ZHOU Jing, ZHANG Bin.
The Research of Extension of Static Constraints Mechanism
in RBAC Model
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2008, 31(3): 123-127.
|
[11] |
TANG Yong-li1,2, XU Guo-ai1, NIU Xin-xin1, YANG Yi-xian1.
Research on Information Security Risk Analysis Model Using Information Entropy
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2008, 31(2): 50-53.
|
[12] |
ZHAO He-ping.
Application of Message Extension to Spacecraft Telecommand Data Protection
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2006, 29(6): 5-8.
|
[13] |
DONG Wei, YANG YI-xian, NIU XIN-xin.
Security Technology Research of GlobalPlatform Based on JavaSIM Card
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2006, 29(3): 91-94.
|
[14] |
PENG Jun-hao,XU Guo-ai,YANG Yi-xian,TANG Yong-li.
Measure Model of Security Risk Based on Utility
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2006, 29(2): 59-61.
|
[15] |
XIA Guang-sheng, YUAN Zhong-lan, YANG Yi-xian, HU Zheng-ming.
A New Visual Cryptography Algorithm to Hide a Two-ColorImagein a Single Shared Image
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2002, 25(3): 12-16.
|