[1] |
LU Mei-lian, ZHANG Zheng-lin, LIU Zhi-chao.
MFWT: a Hybrid Model for Academic Paper Recommender
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2016, 39(4): 24-29.
|
[2] |
CHANG Xiao-kai, ZHU Wan-jie, LI De-kui.
A Feasible Direction Algorithm for Solving 3D Sensor Network Localization
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2016, 39(2): 98-102.
|
[3] |
TANG Yong-li, WANG Fei-fei, YE Qing, YAN Xi-xi.
Improved Provably Secure Certificateless Signature Scheme
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2016, 39(1): 112-116.
|
[4] |
HU Xiang, WANG Wen-dong, GONG Xiang-yang, WANG Bai, QUE Xi-rong.
Social Recommendation Based on Manifold Ranking
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2014, 37(3): 18-22.
|
[5] |
NONG Qiang, HUANG Ru-fen, HUANG Zhen-jie.
Improved for Certificate-Based Signature Scheme
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2014, 37(3): 48-52.
|
[6] |
ZHOU Cai-xue.
Cryptanalysis and Improvement of Certificate-Based Signature Scheme
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2013, 36(6): 98-101.
|
[7] |
LI Zhan-hu, FAN Kai, LI Hui.
Efficient Multiple Signcryption Scheme Based on Two Hard Problems
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2013, 36(6): 23-26.
|
[8] |
PAN Ping, WANG Li-cheng, YANG Yi-xian.
Blind Signature Over Inner Automorphism Group
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2012, 35(6): 83-86.
|
[9] |
YANG Bo, XIAO Zi-bi.
Efficient Certificate-Based Signature Scheme
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2012, 35(5): 73-76.
|
[10] |
.
Encoding Algorithm Based on LU Factorization for LDPC Codes over GF(q)
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2011, 34(3): 35-39.
|
[11] |
.
Matrix Transformation Based NonNegative Matrix Factorization Algorithm
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2010, 33(4): 117-120.
|
[12] |
QIU Huimin1,YANG Yixian1,HU Zhengming1,Zhou Xizeng2.
A Two Way User Authentication Scheme Based on ElGamal Digital Signature
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2005, 28(3): 100-102.
|
[13] |
DAI Yuan-Jun, MA Chun-Guang, YANG Yi-Xian.
An Kind of (t, n)Threshold Secret Sharing Based on Lagrange Insert Value
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2004, 27(2): 24-28.
|
[14] |
ZHONG Ming, YANG Yi-xian.
An Efficient Identification Scheme Based on Discrete Logarithm Assumption
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2001, 24(1): 52-55.
|
[15] |
Li Zhongxian Zhan Banghua Yang Yixian.
Key Authentication Scheme Based on Smart Cards
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 1999, 22(1): 85-87.
|