[1] |
.
A Survey of Random Oracle Model against Quantum Adversary
[J]. Journal of Beijing University of Posts and Telecommunications, 2024, 47(6): 1-10.
|
[2] |
.
Quantum sealed-bid auction protocol based on homomorphic message authentication
[J]. Journal of Beijing University of Posts and Telecommunications, 2024, 47(6): 0-0.
|
[3] |
.
A Secure Protocol of two-party Line Segments Intersection Based on Quantum Homomorphic Encryption
[J]. Journal of Beijing University of Posts and Telecommunications, 2024, 47(6): 0-0.
|
[4] |
LIU Ya, LI Changhui, ZHAO Fengyu, REN Yanli.
Redactable blockchain based on committee mechanism
[J]. Journal of Beijing University of Posts and Telecommunications, 2024, 47(1): 120-126.
|
[5] |
ZHANG Jiamin, SHUAI Lisha, DONG Gaoya, YANG Xiaolong.
A Truth-Oriented Trust Evaluation Model of Shared Messages about Road Events in Internet of Vehicles
[J]. Journal of Beijing University of Posts and Telecommunications, 2023, 46(4): 40-45.
|
[6] |
WU Xuan, JI Weifeng, WENG Jiang, LI Yingqi, SHEN Xiuyu.
Certificateless Handover Authentication and Key Agreement Protocol for Network Slicing
[J]. Journal of Beijing University of Posts and Telecommunications, 2023, 46(4): 103-108.
|
[7] |
REN Yanli, FU Yanxia, LI Yerong.
Verifiable and Secure Aggregation Scheme for Federated Learning
[J]. Journal of Beijing University of Posts and Telecommunications, 2023, 46(3): 49-55.
|
[8] |
KANG Haiyan, ZHANG Shasha.
Cloud Storage and Blockchain Collaborative Access Control Method for Industrial Internet Data Sharing
[J]. Journal of Beijing University of Posts and Telecommunications, 2023, 46(3): 56-61.
|
[9] |
SONG Cheng, CHENG Daochen, NI Shuiping.
k Anonymous Trajectory Privacy Protection Scheme of Personalized Differential Privacy
[J]. Journal of Beijing University of Posts and Telecommunications, 2023, 46(3): 109-114.
|
[10] |
DU Maokang, PENG Junjie, HU Yongjin, Xiao Ling.
Logistic Regression Matrix Factorization Recommendation Algorithm for Differential Privacy
[J]. Journal of Beijing University of Posts and Telecommunications, 2023, 46(3): 115-120.
|
[11] |
REN Shuai, LEI Xuemei, DAN Zhuoyi, HE Xiao, SHI Lei.
Multi-Carrier Information Hiding Algorithm Based on Vertex Partition of 3D Model
[J]. Journal of Beijing University of Posts and Telecommunications, 2023, 46(1): 109-114,126.
|
[12] |
LONG Xiang, CUI Baojiang, WU Jiatong.
A Binary Fuzzy Test Method for UEFI DXE Drivers
[J]. Journal of Beijing University of Posts and Telecommunications, 2023, 46(1): 121-126.
|
[13] |
ZHOU Jingxian, LIU Huiyue, ZHOU Yajian, LYU Zongping.
Blockchain-Oriented Key Management Scheme for Aeronautical Ad Hoc Networks
[J]. Journal of Beijing University of Posts and Telecommunications, 2023, 46(1): 63-68.
|
[14] |
LI Zhaobin, ZHANG Lu, ZHAO Hong, WEI Zhanzhen.
Certificateless Threshold-Based Conditional Proxy Re-Encryption Scheme
[J]. Journal of Beijing University of Posts and Telecommunications, 2023, 46(1): 44-49,83.
|
[15] |
Lü Boyu, ZHANG Jie.
Internal Attack Analysis of Quantum Key Agreement Protocol Based on Quantum Search Algorithm
[J]. Journal of Beijing University of Posts and Telecommunications, 2022, 45(3): 64-68,80.
|