[1] |
WU Xuan, JI Weifeng, WENG Jiang, LI Yingqi, SHEN Xiuyu.
Certificateless Handover Authentication and Key Agreement Protocol for Network Slicing
[J]. Journal of Beijing University of Posts and Telecommunications, 2023, 46(4): 103-108.
|
[2] |
PENG Weiping, HAN Ning, SONG Cheng.
Certificateless Identity Authentication Scheme for Internet of Vehicles in Edge Computing Environment
[J]. Journal of Beijing University of Posts and Telecommunications, 2022, 45(1): 46-51.
|
[3] |
YI Qian, LI Wei, YI Shu-ping, XIE Jun-dong.
Trustworthy Identity Authentication Based on Joint Time-Frequency Analysis of Mouse Behavior
[J]. Journal of Beijing University of Posts and Telecommunications, 2021, 44(4): 121-128.
|
[4] |
XUE Jian-bin, BAI Zi-mei.
Security and Efficient Authentication Scheme for Mobile Edge Computing
[J]. Journal of Beijing University of Posts and Telecommunications, 2021, 44(1): 110-116.
|
[5] |
LI Tao, ZHANG Jing, YANG Hao.
Analysis and Improvement of Privacy Protection Scheme in VANET
[J]. Journal of Beijing University of Posts and Telecommunications, 2020, 43(1): 104-110.
|
[6] |
WANG Ren-zhong, TAO Dan.
Implicit Authentication Mechanism Based on Context Awareness for Smartphone
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2019, 42(6): 118-125.
|
[7] |
SONG Cheng, GU Xin-an, WANG Lei, LIU Zhi-zhong, YAN Xi-xi.
Research on Identity-Based Batch Anonymous Authentication Scheme for Vehicular Network
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2019, 42(5): 69-74.
|
[8] |
XIAO Jian, LI Wen-jiang, GENG Hong-yang, ZHAI Ying-bo.
An Anti-DoS Attack RFID Security Authentication Protocol in the Internet of Vehicles
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2019, 42(2): 114-119.
|
[9] |
ZHANG Jun-song, ZHANG Qi-kun, GAN Yong, MENG Ying-hui.
A New Authentication Protocol for Wireless Medical Sensor Network
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2018, 41(4): 104-109.
|
[10] |
SHI Le-yi, CUI Yu-wen, FU Wen-jing, CHEN Hong-long.
A Lightweight Anonymous Authentication and Key Negotiation Scheme for Clustered WSN
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2018, 41(2): 21-26.
|
[11] |
YAO Su, GUAN Jian-feng, PAN Hua, ZHANG Hong-ke.
Provably Secure Three-Elements Peer Access Authentication Protocol in Identifier/Locator Separation Network
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2017, 40(s1): 58-62.
|
[12] |
MA Li-cui, LI Mei-hong, WU Qian-qian, DU Ye.
Research of Dynamic Key Encryption Algorithm in Smart Grid Communication
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2017, 40(4): 74-79.
|
[13] |
SONG Cheng, ZHANG Ming-yue, PENG Wei-ping, JIA Zong-pu, LIU Zhi-zhong.
Privacy Protection Mechanism Based on Secure Multi-party Computation in VANET
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2017, 40(3): 67-71.
|
[14] |
LIU Yan-bing, SONG Xiu-li, XIAO Yong-gang.
Authentication Mechanism and Trust Model for Internet of Vehicles Paradigm
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2017, 40(3): 1-18.
|
[15] |
ZHANG Qiu-yu, XING Peng-fei, HUANG Yi-bo, DONG Rui-hong, YANG Zhong-ping.
Perceptual Hashing Algorithm for Multi-Format Audio
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2016, 39(4): 77-82.
|