[1] |
KANG Haiyan, ZHANG Shasha.
Cloud Storage and Blockchain Collaborative Access Control Method for Industrial Internet Data Sharing
[J]. Journal of Beijing University of Posts and Telecommunications, 2023, 46(3): 56-61.
|
[2] |
YANG Hua, GENG Xuan, KONG Ning.
A MAC Protocol for Wireless Networks Using Dueling-DDQN Algorithm
[J]. Journal of Beijing University of Posts and Telecommunications, 2023, 46(3): 25-30.
|
[3] |
YAO Rihui, CHEN Wenbai, CHEN Qili, WU Peiliang.
Construction and Application of Knowledge Graph for Home Service Robot
[J]. Journal of Beijing University of Posts and Telecommunications, 2022, 45(5): 72-78.
|
[4] |
LIU Yang, PENG Mu-gen.
Satellite-Ground Fusion Intelligent Networking: Vision and Key Technologies
[J]. Journal of Beijing University of Posts and Telecommunications, 2021, 44(6): 1-12.
|
[5] |
LIU Ning-chun, GAO Shuai, HOU Xin-di, GUO Xing-chang.
A Data Access Control Scheme in Information-Centric Mobile Ad Hoc Networks
[J]. Journal of Beijing University of Posts and Telecommunications, 2021, 44(2): 54-60.
|
[6] |
WANG Zheng, LI Ling, LI Na.
Access Control Scheme Supporting Userand Attribute Revocation in Fog Computing
[J]. Journal of Beijing University of Posts and Telecommunications, 2020, 43(6): 88-95.
|
[7] |
CHEN Hong-song, SHEN Qiang-lei.
Attribute-Based Encryption Scheme With High Efficient Revocation in Cloud Computing Environment
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2018, 41(3): 113-118.
|
[8] |
ZHAO Bin, HE Jing-sha, ZHANG Yi-xuan, JI Xin-rong, XUAN Xing-gang.
Knowledge Discovery of Authorization Rule Based on Rough Set in Trust Based Access Control
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2016, 39(2): 48-52.
|
[9] |
BAI Lei, FENG Zhen-xing, TIAN Li-qin.
CDMA Based MAC Protocol for Underwater Sensor Networks
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2015, 38(s1): 107-110.
|
[10] |
XIE Li-xia, BO Fu-kuan, DENG Qiang.
Multi-Domain Role Trust Access Control Model
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2014, 37(3): 83-88.
|
[11] |
LIU Xing, YUAN Chao-wei, YANG Zhen, HU Zhong-wei.
User Handoff and Access Control Based on Mobile Agent in Mobile Cloud Computing
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2014, 37(2): 88-92.
|
[12] |
ZHANG Guo-bin, LI Ming, KE Fen.
Dynamic Subcarrier Allocation Transferring Access Probability in Cognitive Radio System
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2012, 35(6): 78-82.
|
[13] |
FAN Yan-fang, CAI Ying, GENG Xiu-hua.
A Mandatory Access Control Model with Temporal and Spatial Constraints
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2012, 35(5): 111-114.
|
[14] |
.
Cooperative Hybrid Leader Based Protocol for Multicast Error Control in WLANs
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2012, 35(2): 121-125.
|
[15] |
.
A New Reliable Multicast Control Protocol Used in Wireless Local Area Networks
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2012, 35(1): 81-84.
|