[1] |
SONG Luona, LU Zikui, DENG Qing, ZHANG Qiang, WANG Xiaojuan.
Blockchain-Based Data Storage Model for Land Survey
[J]. Journal of Beijing University of Posts and Telecommunications, 2023, 46(4): 27-31,39.
|
[2] |
DING Qingfeng, YANG Qian, XU Mengyin.
Mapping-Varied Spatial Modulation for Secure Transmission Based on Multi-RIS Optimization
[J]. Journal of Beijing University of Posts and Telecommunications, 2022, 45(5): 91-96.
|
[3] |
SHI Rui, FENG Hua-min, YANG Yang, YUAN Feng, LIU Biao.
Mobile Crowdsensing Scheme with Strong Privacy-Preserving
[J]. Journal of Beijing University of Posts and Telecommunications, 2021, 44(5): 114-120.
|
[4] |
YU Xiu-wu, LI Ying, LIU Yong, XIAO Ren-rong, YU Hao.
Wireless Localization Algorithm of Adaptive Levy Whale Based on Mapping Curve
[J]. Journal of Beijing University of Posts and Telecommunications, 2020, 43(5): 125-129,136.
|
[5] |
LI Zeng-peng, WANG Jiu-ru, ZHANG Wen-yin, MA Chun-guang.
A Threshold Public Key Encryption via Dual Regev Scheme
[J]. Journal of Beijing University of Posts and Telecommunications, 2020, 43(4): 83-87.
|
[6] |
GUAN Yan-ran, Oliver van Kaick, GUAN You-qing.
Research and Implementation of Triangle Mesh Parameterization Method Based on Barycentric Mapping
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2019, 42(5): 83-90.
|
[7] |
ZHANG Jun-song, ZHANG Qi-kun, GAN Yong, MENG Ying-hui.
A New Authentication Protocol for Wireless Medical Sensor Network
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2018, 41(4): 104-109.
|
[8] |
CHU Chun-yan, XIA Xu-jun, ZHANG Sheng-li.
Research on Continuous Variable Quantum Cryptography with Unbalanced Basis Choice
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2016, 39(2): 39-42.
|
[9] |
QI Lin, LI Chao, DOU Zheng.
Modeling and Simulation of MIR UWB Communication System Based on Parallel Combinatory Pulses
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2016, 39(1): 74-78.
|
[10] |
XIANG Xin-yin, LI Hui.
Lattice-Based Online/Offline Signature Scheme
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2015, 38(3): 117-120,134.
|
[11] |
LU Xiu-hua, WEN Qiao-yan, JIN Zheng-ping, WANG Li-cheng, YANG Chun-li.
Improvement of a Fuzzy Identity-Based Lattice Signature Scheme
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2015, 38(2): 55-58.
|
[12] |
LAI Qi-qi, HU Yu-pu, CHEN Yuan, WANG Bao-cang, JIANG Ming-ming.
Construction of Auxiliary-Input Secure Lossy Trapdoor Functions
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2014, 37(6): 6-10.
|
[13] |
DU Xiao-zhou, ZHANG Yu-hao, QIAO Jian-zhong, LIN Shu-kuan.
The File System of CPS Oriented Node Operating System
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2014, 37(5): 100-104.
|
[14] |
JIANG Ming-ming, HU Yu-pu, WANG Bao-cang, WANG Feng-he, LAI Qi-qi.
Efficient Proxy Signature over Lattices
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2014, 37(3): 89-92.
|
[15] |
Jie Liu.
A Transfer Learning Based Text-Image Feature Mapping Algorithm
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2012, 35(6): 1-5.
|