[1] |
CHEN Hong-song, SHEN Qiang-lei.
Attribute-Based Encryption Scheme With High Efficient Revocation in Cloud Computing Environment
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2018, 41(3): 113-118.
|
[2] |
ZHAO Bin, HE Jing-sha, ZHANG Yi-xuan, JI Xin-rong, XUAN Xing-gang.
Knowledge Discovery of Authorization Rule Based on Rough Set in Trust Based Access Control
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2016, 39(2): 48-52.
|
[3] |
BAI Lei, FENG Zhen-xing, TIAN Li-qin.
CDMA Based MAC Protocol for Underwater Sensor Networks
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2015, 38(s1): 107-110.
|
[4] |
XIE Li-xia, BO Fu-kuan, DENG Qiang.
Multi-Domain Role Trust Access Control Model
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2014, 37(3): 83-88.
|
[5] |
LIU Xing, YUAN Chao-wei, YANG Zhen, HU Zhong-wei.
User Handoff and Access Control Based on Mobile Agent in Mobile Cloud Computing
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2014, 37(2): 88-92.
|
[6] |
ZHANG Guo-bin, LI Ming, KE Fen.
Dynamic Subcarrier Allocation Transferring Access Probability in Cognitive Radio System
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2012, 35(6): 78-82.
|
[7] |
FAN Yan-fang, CAI Ying, GENG Xiu-hua.
A Mandatory Access Control Model with Temporal and Spatial Constraints
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2012, 35(5): 111-114.
|
[8] |
.
Cooperative Hybrid Leader Based Protocol for Multicast Error Control in WLANs
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2012, 35(2): 121-125.
|
[9] |
.
A New Reliable Multicast Control Protocol Used in Wireless Local Area Networks
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2012, 35(1): 81-84.
|
[10] |
.
A RoleExtended RBAC for Encrypted Data
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2011, 34(5): 19-24.
|
[11] |
.
A Control Channel Reserving Based MAC Protocol for Cognitive Radio Networks
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2010, 33(4): 79-82.
|
[12] |
HU Jin-long1,2;PANG Di2;ZHOU Ji-hua2;ZHAO Cui-cui2;SHI Jing-lin1,2.
A Flexible and Portable WiMAX MAC Protocol Stack Software System
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2010, 33(1): 70-73.
|
[13] |
CAO Peng,JING Yuan,HUANG Guo-ce.
A Distributed Dynamic Token Relay Protocol Based on Sub-Queue
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2009, 32(5): 88-92.
|
[14] |
WEI Rong1,2, WANG Zhao-xiang1, YU Tian-hang3,WU Mu-qing1 .
MAC Scheme for Differentiated Service in Multi-Hop Ad Hoc Networks
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2008, 31(5): 117-120.
|
[15] |
ZHANG Hong-qi, ZHOU Jing, ZHANG Bin.
The Research of Extension of Static Constraints Mechanism
in RBAC Model
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2008, 31(3): 123-127.
|