[1] |
ZHOU Jingxian, LIU Huiyue, ZHOU Yajian, LYU Zongping.
Blockchain-Oriented Key Management Scheme for Aeronautical Ad Hoc Networks
[J]. Journal of Beijing University of Posts and Telecommunications, 2023, 46(1): 63-68.
|
[2] |
LIU Ning-chun, GAO Shuai, HOU Xin-di, GUO Xing-chang.
A Data Access Control Scheme in Information-Centric Mobile Ad Hoc Networks
[J]. Journal of Beijing University of Posts and Telecommunications, 2021, 44(2): 54-60.
|
[3] |
WEN Wei.
Routing Algorithm Based on Density Clustering for Delay Tolerant Network
[J]. Journal of Beijing University of Posts and Telecommunications, 2020, 43(5): 137-142.
|
[4] |
LI Tao, ZHANG Jing, YANG Hao.
Analysis and Improvement of Privacy Protection Scheme in VANET
[J]. Journal of Beijing University of Posts and Telecommunications, 2020, 43(1): 104-110.
|
[5] |
MA Bin, MAO Bu-xuan, XIE Xian-zhong.
Vertical Handoff Algorithm for Reducing Congestion in Ad Hoc Heterogeneous Network
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2019, 42(2): 19-24.
|
[6] |
BAI Yuan, AN Jie, ZHANG Hui-bing.
Prediction-Aided Routing Protocol in Ad hoc Network
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2017, 40(s1): 29-33.
|
[7] |
ZHANG Guo-min, WANG Na, WANG Rui, CHEN Qiu-li, LIU Fang-xin.
UAV 3D Mobility Model Based on Visit Density
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2017, 40(s1): 112-116.
|
[8] |
LIU Ying, ZHU Si-yan, SUN Chen-hua, LI Guo-yan.
Performance Modeling and Analysis of Multi-Hop Ad Hoc Network under Delay Constraint
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2017, 40(5): 24-29.
|
[9] |
SONG Cheng, ZHANG Ming-yue, PENG Wei-ping, JIA Zong-pu, LIU Zhi-zhong.
Privacy Protection Mechanism Based on Secure Multi-party Computation in VANET
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2017, 40(3): 67-71.
|
[10] |
WANG He-zhe, WANG Hui-qiang, ZHU Jin-mei, FENG Guang-sheng, LÜ Hong-wu.
OCIGM:an Optimized Control Information Generation Method for DTN Routing
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2017, 40(1): 79-83.
|
[11] |
REN Jian-jun, SHAO Su-jie, GUO Shao-yong, QI Feng.
A Clustering Algorithm with Two-Tier Structure Applied in VANET Network
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2016, 39(s1): 23-26.
|
[12] |
ZHU Li-cai, WANG Ru-chuan, YANG Hao, SHA Chao.
An Energy-Efficient Multi-Path Data Distribution Mechanism Based on RPL
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2016, 39(6): 82-87.
|
[13] |
LI Xu, BAO Jing-jing, LIU Ying.
Formation Security: Black Hole Problem
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2016, 39(1): 12-17.
|
[14] |
WANG Jian, ZHANG Zi-jian, YUAN Jian.
A Broadcast Authentication System Applied in Controller Area Network
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2015, 38(4): 24-28.
|
[15] |
WANG Hui-qiang, ZHU Jin-mei, FENG Guang-sheng, LÜ Hong-wu.
SaW-Utility: a Spray and Wait Routing Protocol Based on the Utility of Nodes in DTN
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2015, 38(4): 128-132.
|