[1] |
.
Opportunistic transmission control method for apron sensing network based on game theory
[J]. Journal of Beijing University of Posts and Telecommunications, 2020, 43(5): 0-0.
|
[2] |
YI Zhi-ling, WANG Sen, HAN Shuang-feng, CUI Chun-feng, WANG Ya-feng.
From 5G to 6G: Requirements, Challenges and Technical Trends
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2020, 43(2): 1-9.
|
[3] |
YU Kai-xiang, CHEN Zhen-hao, ZHANG Si-hai.
A Key Variable Detection Algorithm in Multivariate Manufacturing Process
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2019, 42(6): 98-104.
|
[4] |
SUN Tian-yu, YU Wen-sheng.
A Mechanized Proof of Equivalence Between the Axiom of Choice and Tukey’s Lemma
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2019, 42(5): 1-7.
|
[5] |
ZHENG Shi-hui, WEN Kai, GU Li-ze.
An Efficient Multi-Bit Quantum Public Key Encryption Scheme
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2019, 42(4): 38-42.
|
[6] |
JIN Shu-xin, YAO Zheng, JIA Shen-hui, LU Ming-quan.
High-Speed Non-Binary Coding and Modulation Techniques of GNSS Message
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2018, 41(4): 97-103.
|
[7] |
SHI Le-yi, CUI Yu-wen, FU Wen-jing, CHEN Hong-long.
A Lightweight Anonymous Authentication and Key Negotiation Scheme for Clustered WSN
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2018, 41(2): 21-26.
|
[8] |
MA Li-cui, LI Mei-hong, WU Qian-qian, DU Ye.
Research of Dynamic Key Encryption Algorithm in Smart Grid Communication
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2017, 40(4): 74-79.
|
[9] |
LEI Wei-jia, LIN Xiu-zhen, XIE Xian-zhong.
An Optimized Artificial Noise Strategy in Physical Layer Security Transmission Scheme with PSK Modulation
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2017, 40(1): 62-67.
|
[10] |
BAI Yuan, WANG Qian, JIA Qi-lan, ZHANG Hui-bing.
An Efficient and Secured AKA for EPS Networks
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2015, 38(s1): 10-14.
|
[11] |
JIA Qi-lan, BAI Yuan, WANG Qian, ZHANG Hui-bing.
Research on SQN's Security in UMTS AKA
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2015, 38(s1): 87-91.
|
[12] |
LEI Wei-jia, LAN Shun-fu, CHEN Sheng-nan, XIE Xian-zhong.
The Physical Security Scheme Based on Generalized Space Shift Keying Modulation
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2015, 38(4): 39-44.
|
[13] |
BAI Yuan, WANG Qian, JIA Qi-lan, HAO Rui-min, ZHANG Hui-bing.
A Dynamic Selection Algorithm for the Size of Authentication Vector Arrays
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2015, 38(3): 66-70.
|
[14] |
MENG Xiang-wu, JI Wei-yu, ZHANG Yu-jie.
A Survey of Recommendation Systems in Big Data
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2015, 38(2): 1-15.
|
[15] |
XU Ming, WU Jian-ping, DU Yi-man, XIE Feng, XIAO Yun-peng.
A Method of Key Node Ranking for Road Network Based on Tripartite Graph
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2014, 37(s1): 51-54.
|