[1] |
TANG Hong-wei, FENG Sheng-zhong, ZHAO Xiao-fang.
TOChain: a High-Performance SFC for Virtual Network Security
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2018, 41(1): 70-80.
|
[2] |
TANG Yong-li, WANG Fei-fei, YE Qing, YAN Xi-xi.
Improved Provably Secure Certificateless Signature Scheme
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2016, 39(1): 112-116.
|
[3] |
LI Xu, BAO Jing-jing, LIU Ying.
Formation Security: Black Hole Problem
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2016, 39(1): 12-17.
|
[4] |
BAI Yuan, WANG Qian, JIA Qi-lan, ZHANG Hui-bing.
An Efficient and Secured AKA for EPS Networks
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2015, 38(s1): 10-14.
|
[5] |
LIU Jing, GU Li-ze, Niu Xin-xin, YANG Yi-xian, LI Zhong-xian.
Network Security Events Analyze Method Based on Neural Networks and Genetic Algorithm
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2015, 38(2): 50-54.
|
[6] |
FU Yu, CHEN Yong-qiang, WU Xiao-ping, SONG Yan.
Network Attack-Defense Strategies Selection Based on Stochastic Game Model
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2014, 37(s1): 35-39.
|
[7] |
CHEN Yong-qiang, WU Xiao-ping, FU Yu, SONG Yan.
Network Security Evaluation Based on Stochastic Game and Network Entropy
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2014, 37(s1): 92-96.
|
[8] |
JIANG Ming-ming, HU Yu-pu, WANG Bao-cang, WANG Feng-he, LAI Qi-qi.
Efficient Proxy Signature over Lattices
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2014, 37(3): 89-92.
|
[9] |
NONG Qiang, HUANG Ru-fen, HUANG Zhen-jie.
Improved for Certificate-Based Signature Scheme
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2014, 37(3): 48-52.
|
[10] |
ZHOU Cai-xue.
Cryptanalysis and Improvement of Certificate-Based Signature Scheme
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2013, 36(6): 98-101.
|
[11] |
LI Zhan-hu, FAN Kai, LI Hui.
Efficient Multiple Signcryption Scheme Based on Two Hard Problems
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2013, 36(6): 23-26.
|
[12] |
PAN Ping, WANG Li-cheng, YANG Yi-xian.
Blind Signature Over Inner Automorphism Group
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2012, 35(6): 83-86.
|
[13] |
WANG Xin, SUN Chen, WANG Xin-mei.
Application of Homomorphic Hash Function in Multivariate Public Key Cryptosystem
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2012, 35(5): 46-48.
|
[14] |
YANG Bo, XIAO Zi-bi.
Efficient Certificate-Based Signature Scheme
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2012, 35(5): 73-76.
|
[15] |
.
Network Security Analysis Based on Host-Security-Group
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2012, 35(1): 19-23.
|