[1] |
SONG Luona, LU Zikui, DENG Qing, ZHANG Qiang, WANG Xiaojuan.
Blockchain-Based Data Storage Model for Land Survey
[J]. Journal of Beijing University of Posts and Telecommunications, 2023, 46(4): 27-31,39.
|
[2] |
ZHOU Jingxian, LIU Huiyue, ZHOU Yajian, LYU Zongping.
Blockchain-Oriented Key Management Scheme for Aeronautical Ad Hoc Networks
[J]. Journal of Beijing University of Posts and Telecommunications, 2023, 46(1): 63-68.
|
[3] |
SONG Cheng, JIN Tong, HE Jun-yi.
A Multi-Value Prediction Location Privacy Protection Mechanism
[J]. Journal of Beijing University of Posts and Telecommunications, 2021, 44(6): 103-108.
|
[4] |
CHEN Wei, HUO Ru, WANG Shuo, HUANG Tao, LIU Yun-jie.
A Blockchain-Based D2D-Assisted Multi-Access Edge Computing Architecture for Resource Sharing
[J]. Journal of Beijing University of Posts and Telecommunications, 2021, 44(5): 1-9.
|
[5] |
ZHA Yu-kun, ZHI Hui, FANG Xiao-tong.
Blockchain-Based Cooperative Computing Scheme for IoT Intelligent Terminals
[J]. Journal of Beijing University of Posts and Telecommunications, 2021, 44(2): 89-94.
|
[6] |
CAO Bin, NIE Kai-jun, PENG Mu-gen, ZHOU Zhi-zhong, ZHANG Lei.
Overhead Analysis of Blockchain Consensus Algorithm in Wireless Networks
[J]. Journal of Beijing University of Posts and Telecommunications, 2020, 43(6): 140-146.
|
[7] |
MEI Ya-xin, SHEN Xue-wei, ZHAO Dan, WANG Tian.
An Edge-Based Differential Method for Data Protection in Sensor-Cloud
[J]. Journal of Beijing University of Posts and Telecommunications, 2020, 43(4): 48-53,75.
|
[8] |
WANG Min, ZHANG Bi-ling.
Contract-Based Cache Renting Mechanism in UAV-Assisted 5G Networks
[J]. Journal of Beijing University of Posts and Telecommunications, 2020, 43(3): 83-91.
|
[9] |
SONG Cheng, ZHANG Ya-dong, PENG Wei-ping, WANG Lei, LIU Zhi-zhong.
Research on Location Privacy Protection Scheme Based on Similar Trajectory Replacement
[J]. Journal of Beijing University of Posts and Telecommunications, 2020, 43(1): 135-142.
|
[10] |
LI Tao, ZHANG Jing, YANG Hao.
Analysis and Improvement of Privacy Protection Scheme in VANET
[J]. Journal of Beijing University of Posts and Telecommunications, 2020, 43(1): 104-110.
|
[11] |
DUAN Yu-cong, ZHANG You-liang, BAI Yong, CAO Chun-jie.
Privacy Protection Strategy for Implicit Typed Resources
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2019, 42(4): 121-125.
|
[12] |
SONG Cheng, ZHANG Ya-dong, WANG Lei, LIU Zhi-zhong, CHAO Hao.
Trajectory Privacy Protection Scheme Based on DTW Exchange Query
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2018, 41(6): 97-102.
|
[13] |
HUANG Jun-fei, LIU Jie.
Survey on Blockchain Research
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2018, 41(2): 1-8.
|
[14] |
HUANG Xiao-fang, XU Lei, YANG Xi.
Blockchain Model of Cloud Forensics
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2017, 40(6): 120-124.
|
[15] |
ZHU Yi, WANG Xin-ping, HUANG Ru-hui, KANG Hao-hao, CAO Qing-hua.
A Cache Pollution Defense Mechanism Based on Trust Judgment of Face Abnormality in Content Centric Networking
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2017, 40(6): 14-18.
|