[1] |
ZHU De-qing, TIAN Xian-zhong, LUAN Shen-ji.
PMIPv6 Performance Modeling and Analysis under the Scenario of Multi-Mobile Node's Simultaneous Handoff
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2019, 42(4): 43-49.
|
[2] |
CHEN Hong-song, SHEN Qiang-lei.
Attribute-Based Encryption Scheme With High Efficient Revocation in Cloud Computing Environment
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2018, 41(3): 113-118.
|
[3] |
TAN Jun, CHEN Wei, LIU Jian-guo, ZHANG Yi-ming, ZHU Ning-hua.
Experimental Investigation of Coupling Interfering System in the Transparent Optical Network
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2018, 41(3): 20-26.
|
[4] |
TANG Hong-wei, FENG Sheng-zhong, ZHAO Xiao-fang.
TOChain: a High-Performance SFC for Virtual Network Security
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2018, 41(1): 70-80.
|
[5] |
ZHAO Bin, HE Jing-sha, ZHANG Yi-xuan, JI Xin-rong, XUAN Xing-gang.
Knowledge Discovery of Authorization Rule Based on Rough Set in Trust Based Access Control
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2016, 39(2): 48-52.
|
[6] |
LI Xu, BAO Jing-jing, LIU Ying.
Formation Security: Black Hole Problem
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2016, 39(1): 12-17.
|
[7] |
BAI Yuan, WANG Qian, JIA Qi-lan, ZHANG Hui-bing.
An Efficient and Secured AKA for EPS Networks
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2015, 38(s1): 10-14.
|
[8] |
BAI Lei, FENG Zhen-xing, TIAN Li-qin.
CDMA Based MAC Protocol for Underwater Sensor Networks
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2015, 38(s1): 107-110.
|
[9] |
CHEN Dan-wei, WU Qiong, CHEN Lin-ling, PAN Su.
Attribute-Based Encryption without Central Authority: DMA-ABE
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2015, 38(5): 77-80.
|
[10] |
LIU Jing, GU Li-ze, Niu Xin-xin, YANG Yi-xian, LI Zhong-xian.
Network Security Events Analyze Method Based on Neural Networks and Genetic Algorithm
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2015, 38(2): 50-54.
|
[11] |
FU Yu, CHEN Yong-qiang, WU Xiao-ping, SONG Yan.
Network Attack-Defense Strategies Selection Based on Stochastic Game Model
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2014, 37(s1): 35-39.
|
[12] |
CHEN Yong-qiang, WU Xiao-ping, FU Yu, SONG Yan.
Network Security Evaluation Based on Stochastic Game and Network Entropy
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2014, 37(s1): 92-96.
|
[13] |
ZHANG Qi-zhi, RAO Liang, CHEN Yuan, HU Xue-cong.
Partially Distributed Mobility Management for Proxy Mobile IPv6
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2014, 37(6): 28-33.
|
[14] |
JIANG Ming-ming, HU Yu-pu, WANG Bao-cang, WANG Feng-he, LAI Qi-qi.
Efficient Proxy Signature over Lattices
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2014, 37(3): 89-92.
|
[15] |
XIE Li-xia, BO Fu-kuan, DENG Qiang.
Multi-Domain Role Trust Access Control Model
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2014, 37(3): 83-88.
|