[1] |
.
A New Algorithm for Finding Quantum Difference Based on Bernstein-Vazirani Algorithm
[J]. Journal of Beijing University of Posts and Telecommunications, 2024, 47(6): 0-0.
|
[2] |
.
Reference-Modulated Code Shifted Differential Chaos Shift Keying Modulation Scheme
[J]. Journal of Beijing University of Posts and Telecommunications, 2024, 47(3): 48-54.
|
[3] |
.
A Reconfigurable Intelligent Surface Assisted Secure Communication Secrecy Performance Optimization Scheme#br#
[J]. Journal of Beijing University of Posts and Telecommunications, 2024, 47(3): 90-95.
|
[4] |
.
Chaotic Spread Spectrum Communication with Coupled Map Lattice based on Cellular Automata
[J]. Journal of Beijing University of Posts and Telecommunications, 2023, 46(6): 72-0.
|
[5] |
LI Zineng, HU Zhiqun, XIAO Hailin, ZENG Zhangfan.
UAV security communication algorithm with Intelligent Reflecting Surface and cooperative Jamming
[J]. Journal of Beijing University of Posts and Telecommunications, 2023, 46(1): 69-76.
|
[6] |
YAN Xinyu, YANG Hua, XU Siyuan, JIANG Guoping, LIN Gengchen.
Noise Reduction Carrier Index Differential Chaos Shift Keying Modulation System
[J]. Journal of Beijing University of Posts and Telecommunications, 2022, 45(3): 74-80.
|
[7] |
WANG Xiao-nan, FU Jin-xuan, YU Hong-fang, SUN Gang, CHEN Hai-bing.
Network Protocol Security Analysis Based on Abstract Principle and Model Detection
[J]. Journal of Beijing University of Posts and Telecommunications, 2021, 44(2): 40-46.
|
[8] |
WANG Xiao-xiao, DAN Zhen-lei, GU Chen-wei, ZHU Wei-ping, LIN Min.
Secure Beamforming Scheme for Multi-Antenna UAV Communication Systems
[J]. Journal of Beijing University of Posts and Telecommunications, 2020, 43(6): 103-109.
|
[9] |
XIAO Jian, LI Wen-jiang, GENG Hong-yang, ZHAI Ying-bo.
An Anti-DoS Attack RFID Security Authentication Protocol in the Internet of Vehicles
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2019, 42(2): 114-119.
|
[10] |
MA Ying-jie, ZHAO Geng, FAN Xiao-hong, ZHANG Xin-ran, GAO Yuan.
Quantum Chaotic Extended Sequence Algorithm for 5G F-OFDM
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2019, 42(2): 90-94.
|
[11] |
ZHANG Jing, LUO Shou-shan, YANG Yi-xian, XIN Yang.
Private Sets Intersection Protocols Based on Cloud Computing
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2019, 42(2): 13-18.
|
[12] |
LEI Wei-jia, LI Yu-yu.
A Joint Scheme for Error Correction and Secrecy Based on Rateless Error Correction Codes
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2019, 42(1): 74-80.
|
[13] |
WANG Yan, LI Shun-bo, ZHAO Song, XUE Gai-na.
Fermat Number and 2-Adic Complexity of a Class of Maximum Period Sequence
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2018, 41(2): 81-85.
|
[14] |
MA Ying-jie, LI Ya, XIE Rong-na.
3-D 2×2×2-grid Scroll Chaotic System and Its Circuit Implementation
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2017, 40(2): 84-87.
|
[15] |
YANG Yi-xian, NIU Xin-Xin.
The General Theory of Security (2)——Blind Offensive and Defensive
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2016, 39(2): 113-118.
|