[1] |
.
A Threshold Public Key Encryption via Dual Regev Scheme
[J]. , 2020, 43(4): 83-87.
|
[2] |
XV Ling-yi, HAN Dao-qi, LIU Wen.
Anti-Collision Broadcasting Scheme Based on iBeacon in Internet of Things
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2020, 43(2): 66-73.
|
[3] |
CHEN Pei-pei, LI Tao-shen, GE Zhi-hui, FANG Xing.
Secure Beamforming Design for Full-Duplex Energy-Constrained Relaying Networks
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2020, 43(2): 59-65,79.
|
[4] |
LI Tao, ZHANG Jing, YANG Hao.
Analysis and Improvement of Privacy Protection Scheme in VANET
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2020, 43(1): 104-110.
|
[5] |
LEI Wei-jia, LI Huan.
Signal Combining and Self-Interference Cancellation Scheme Based on Linear Neural Network in a Full-Duplex Receiver Cooperative Jamming System
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2020, 43(1): 61-67.
|
[6] |
XIAO Jian, LI Wen-jiang, GENG Hong-yang, ZHAI Ying-bo.
An Anti-DoS Attack RFID Security Authentication Protocol in the Internet of Vehicles
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2019, 42(2): 114-119.
|
[7] |
LEI Wei-jia, LI Yu-yu.
A Joint Scheme for Error Correction and Secrecy Based on Rateless Error Correction Codes
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2019, 42(1): 74-80.
|
[8] |
REN Pin-yi, TANG Xiao.
A Review on Physical Layer Security Techniques for 5G
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2018, 41(5): 69-77.
|
[9] |
LIU Zhe, ZHANG Qiao-yu, CHENG Ming-zhi.
A Physical Layer Secure Communication Mechanism Based on Multidimensional Constellation
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2018, 41(4): 9-15.
|
[10] |
TANG Hong-wei, FENG Sheng-zhong, ZHAO Xiao-fang.
TOChain: a High-Performance SFC for Virtual Network Security
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2018, 41(1): 70-80.
|
[11] |
DONG Feng, LIU Tian-ming, XU Guo-ai, GUO Yan-hui, LI Cheng-ze.
Defect Prediction Method for Android Binary Files
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2018, 41(1): 13-23.
|
[12] |
CAO Yang, ZHANG Bin, QIU Xue-song, GUO Shao-yong.
Coalitional Hedonic Game for Secure Wireless Transmission with Cooperative Jamming
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2017, 40(s1): 20-23,33.
|
[13] |
ZHANG Shu-hui, MENG Xiang-xu, WANG Lian-hai, XU Shu-jiang.
A Security Protection Model for Virtualization Based on Memory Introspection
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2017, 40(s1): 43-47.
|
[14] |
ZHOU Chun-ru, LIU Xiao-ming, LEI Min, WU Xu-dong, DENG Shi-qi.
Research on Defense of Slow DDoS Attack on Web Server Application Layer
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2017, 40(s1): 77-80.
|
[15] |
ZHAO Jian, WANG Rui, LI Zheng-min, LEI Min, MA Min-yao.
Security Threats and Risk Assessment of IoT System
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2017, 40(s1): 135-139.
|