[1] |
.
Trusted predictive cache architecture for Internet of vehicles privacy protection combined with blockchain
[J]. Journal of Beijing University of Posts and Telecommunications, 2022, 45(6): 145-150.
|
[2] |
CHEN Chen, ZHOU Lin, CHEN Qi-wang, CHEN Yan, HE Yu-cheng.
Unequal Error Protection Scheme Based on Joint Coding for Relay Systems
[J]. Journal of Beijing University of Posts and Telecommunications, 2021, 44(1): 59-65.
|
[3] |
MEI Ya-xin, SHEN Xue-wei, ZHAO Dan, WANG Tian.
An Edge-Based Differential Method for Data Protection in Sensor-Cloud
[J]. Journal of Beijing University of Posts and Telecommunications, 2020, 43(4): 48-53,75.
|
[4] |
SONG Cheng, ZHANG Ya-dong, PENG Wei-ping, WANG Lei, LIU Zhi-zhong.
Research on Location Privacy Protection Scheme Based on Similar Trajectory Replacement
[J]. Journal of Beijing University of Posts and Telecommunications, 2020, 43(1): 135-142.
|
[5] |
LI Tao, ZHANG Jing, YANG Hao.
Analysis and Improvement of Privacy Protection Scheme in VANET
[J]. Journal of Beijing University of Posts and Telecommunications, 2020, 43(1): 104-110.
|
[6] |
WANG Jing, LIU Yan, YU Chun-lei, WANG Mi, LIU Xiang-yang.
Construction of Group Repairable Codes for Non-Uniform Fault Protection
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2019, 42(5): 75-82.
|
[7] |
DUAN Yu-cong, ZHANG You-liang, BAI Yong, CAO Chun-jie.
Privacy Protection Strategy for Implicit Typed Resources
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2019, 42(4): 121-125.
|
[8] |
SONG Cheng, ZHANG Ya-dong, WANG Lei, LIU Zhi-zhong, CHAO Hao.
Trajectory Privacy Protection Scheme Based on DTW Exchange Query
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2018, 41(6): 97-102.
|
[9] |
SONG Cheng, ZHANG Ming-yue, PENG Wei-ping, JIA Zong-pu, LIU Zhi-zhong.
Privacy Protection Mechanism Based on Secure Multi-party Computation in VANET
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2017, 40(3): 67-71.
|
[10] |
ZHU Yin-tao, PENG Zhen, YANG Fang, LI Kai, YUN Kai.
Primary Path Handover in Wide-Area Backup Protection
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2015, 38(s1): 53-57.
|
[11] |
ZHANG Peng, ZHANG Wen, NIU Shao-zhang, HUANG Zhen-peng.
Android Software Protection Method by Enhancing Security of Native Programs
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2015, 38(1): 21-25.
|
[12] |
LI Meng-xing, FENG Quan, YANG Mei, ZHAO Jian, HE Kang.
Garbled Circuits Based Alignment-Free Fingerprint Matching
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2014, 37(6): 81-85.
|
[13] |
WANG Bin, WANG Wen-nai.
High Performance Ring Protection for Carrier Ethernet
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2013, 36(5): 71-75.
|
[14] |
LI Xin, ZHANG Jie, HUANG Shan-guo, ZHAO Yong-li, GU Wan-yi.
Application of k-Regular and k-Connected Protection Structure in Optical Networks
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2013, 36(5): 76-80.
|
[15] |
Hong-Yu YANG Dai QiKui.
A Novel Approach for Network SelfProtection Mechanism
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2011, 34(3): 122-126.
|