[1] |
SHI Rui, FENG Hua-min, YANG Yang, YUAN Feng, LIU Biao.
Mobile Crowdsensing Scheme with Strong Privacy-Preserving
[J]. Journal of Beijing University of Posts and Telecommunications, 2021, 44(5): 114-120.
|
[2] |
LI Zeng-peng, WANG Jiu-ru, ZHANG Wen-yin, MA Chun-guang.
A Threshold Public Key Encryption via Dual Regev Scheme
[J]. Journal of Beijing University of Posts and Telecommunications, 2020, 43(4): 83-87.
|
[3] |
ZHANG Jun-song, ZHANG Qi-kun, GAN Yong, MENG Ying-hui.
A New Authentication Protocol for Wireless Medical Sensor Network
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2018, 41(4): 104-109.
|
[4] |
ZHA Ya-xing, LUO Shou-shan, LI Wei, BIAN Jian-chao.
Dynamic Group Public Auditing Scheme for Shared Data on Attribute-Based Threshold Signature
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2017, 40(5): 43-49.
|
[5] |
LEI Wei-jia, SHENG Jie, XIE Xian-zhong.
Encoding and Decoding Scheme of Security-Enhanced LT Codes
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2016, 39(4): 108-113.
|
[6] |
YANG Hong-yu, CHENG Xiang.
Information System Risk Control Method Based on Work-Flow
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2016, 39(3): 105-109.
|
[7] |
CHU Chun-yan, XIA Xu-jun, ZHANG Sheng-li.
Research on Continuous Variable Quantum Cryptography with Unbalanced Basis Choice
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2016, 39(2): 39-42.
|
[8] |
XIANG Xin-yin, LI Hui.
Lattice-Based Online/Offline Signature Scheme
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2015, 38(3): 117-120,134.
|
[9] |
LU Xiu-hua, WEN Qiao-yan, JIN Zheng-ping, WANG Li-cheng, YANG Chun-li.
Improvement of a Fuzzy Identity-Based Lattice Signature Scheme
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2015, 38(2): 55-58.
|
[10] |
LAI Qi-qi, HU Yu-pu, CHEN Yuan, WANG Bao-cang, JIANG Ming-ming.
Construction of Auxiliary-Input Secure Lossy Trapdoor Functions
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2014, 37(6): 6-10.
|
[11] |
JIANG Ming-ming, HU Yu-pu, WANG Bao-cang, WANG Feng-he, LAI Qi-qi.
Efficient Proxy Signature over Lattices
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2014, 37(3): 89-92.
|
[12] |
GE Hai-hui, ZHENG Shi-hui, CHEN Tian-ping, YANG Yi-xian.
Fuzzy Risk Assessment of Information Security Threat Scenario
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2013, 36(6): 89-92,107.
|
[13] |
WANG Xin, SUN Chen, WANG Xin-mei.
Application of Homomorphic Hash Function in Multivariate Public Key Cryptosystem
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2012, 35(5): 46-48.
|
[14] |
.
Cryptanalysis and Improvement of a Certificateless Strong Proxy Signature Scheme
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2011, 34(5): 115-118.
|
[15] |
.
A Hybrid Multivariate Signature Scheme Based on HFEv and IPHFE
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2011, 34(4): 105-108.
|