[1] |
REN Shuai, WANG Zhen, XU Zhen-chao, SU Dong-xu, HE Yuan.
Information Hiding Scheme Based on Texture Mapping of 3D Model in OBJ Format
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2019, 42(1): 22-27.
|
[2] |
XUE Yi-ming, HE Ning-ning, CHEN Yao, HU Cai-e, NIU Shao-zhang.
Speech Hiding Algorithm Based on Mobile Circuit-Switched Domain
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2017, 40(6): 57-64.
|
[3] |
BAI Jian, CAO Peng.
Capacity Estimation Research for Speech Information Hiding
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2016, 39(s1): 76-80.
|
[4] |
LEI Wei-jia, SHENG Jie, XIE Xian-zhong.
Encoding and Decoding Scheme of Security-Enhanced LT Codes
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2016, 39(4): 108-113.
|
[5] |
ZHANG Shuai, WANG Peng, SUN Yan.
Adaptive Model of Information Hiding for the Same Type
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2016, 39(4): 35-39.
|
[6] |
YANG Hong-yu, CHENG Xiang.
Information System Risk Control Method Based on Work-Flow
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2016, 39(3): 105-109.
|
[7] |
GE Hai-hui, ZHENG Shi-hui, CHEN Tian-ping, YANG Yi-xian.
Fuzzy Risk Assessment of Information Security Threat Scenario
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2013, 36(6): 89-92,107.
|
[8] |
.
Information Hiding Technology of KML File
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2011, 34(1): 140-144.
|
[9] |
QIN Hua-wang;DAI Yue-wei;WANG Zhi-quan.
Threshold Signature Scheme Based on the General Access Structure
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2009, 32(6): 102-104.
|
[10] |
LuZhenbang,ZHOU Bo.
Hierarchical Risk Assessment Based on Shapley Entropies and Choquet Integrals
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2009, 32(6): 83-87.
|
[11] |
LEI Xin-Feng.
Implement of Chinese-Wall Model Based on an Open Synthetical Security Model
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2009, 32(3): 73-76.
|
[12] |
XU Guo-ai1, ZHANG Miao1, CHEN Ai-guo1, LI Zhong-xian2 .
An Integer Overflow Detection Method Based on Integer Variable Unification
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2008, 31(6): 90-93.
|
[13] |
LI Da-lin, LIN Xue-hong, LIN Jia-ru, WU Wei-ling.
A Necessary Condition for Secure Network Coding
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2008, 31(5): 9-12.
|
[14] |
YE Tian-yu, NIU Xin-xin, YANG Yi-xian.
Analysis on the Performances of Information Hiding System under Passive Attack
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2008, 31(3): 46-49.
|
[15] |
TANG Yong-li1,2, XU Guo-ai1, NIU Xin-xin1, YANG Yi-xian1.
Research on Information Security Risk Analysis Model Using Information Entropy
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2008, 31(2): 50-53.
|