[1] |
Meng Hui, Ren Lina, Zhao Zongqu.
Identity-based proxy re-encryption scheme from RLWE assumption with ciphertext evolution
[J]. The Journal of China Universities of Posts and Telecommunications, 2023, 30(5): 51-60.
|
[2] |
Luo Zhiyong, Wang Shuyi, Song Weiwei, Liu Jiahui, Wang Jianming.
Research on security situation awareness algorithm of Markov differential game block-chain model
[J]. The Journal of China Universities of Posts and Telecommunications, 2023, 30(4): 105-120.
|
[3] |
Han Yushan, Che Bichen, Liu Jiali, Dou Zhao, Di Junyu.
Nearly universal and efficient quantum secure multi-party computation protocol
[J]. The Journal of China Universities of Posts and Telecommunications, 2022, 29(4): 51-68.
|
[4] |
Han Gang, Xing Qixuan, Zhang Yinghui.
Fine-grained cooperative access control scheme with hidden policies
[J]. The Journal of China Universities of Posts and Telecommunications, 2021, 28(6): 13-25.
|
[5] |
.
Trusted data access and authorization protocol
[J]. The Journal of China Universities of Posts and Telecommunications, 2021, 28(5): 18-26.
|
[6] |
刘巧 唐碧华 Chen Xue Fan Wu 范文浩.
Multi-level sharded blockchain system for edge computing
[J]. The Journal of China Universities of Posts and Telecommunications, 2021, 28(5): 46-58.
|
[7] |
Zhao Guosheng, Liu Dongmei, Wang Jian.
Cloud security situation prediction method based on grey wolf optimization and BP neural network
[J]. The Journal of China Universities of Posts and Telecommunications, 2020, 27(6): 30-41.
|
[8] |
Lin Jie, Liu Chuanyi, Fang Binxing.
VMScan: an out-of-VM malware scanner
[J]. The Journal of China Universities of Posts and Telecommunications, 2020, 27(4): 59-68.
|
[9] |
Shang Yujie, Zhang Leyou, Gao Xiaoxu.
Continual auxiliary leakage-resilient attribute-based broadcast encryption with constant size ciphertexts
[J]. The Journal of China Universities of Posts and Telecommunications, 2020, 27(4): 69-82.
|
[10] |
.
Improved authenticated key agreement protocol based on Bi-ISIS problem
[J]. The Journal of China Universities of Posts and Telecommunications, 2020, 27(3): 93-102.
|
[11] |
.
End-to-end encrypted network traffic classification method based on deep learning
[J]. The Journal of China Universities of Posts and Telecommunications, 2020, 27(3): 21-30.
|
[12] |
Li Lintao, Liu Yuanan.
Physical layer security enhanced system with
under-sampling spectrum-sparse signals
[J]. The Journal of China Universities of Posts and Telecommunications, 2019, 26(4): 8-16.
|
[13] |
xiao-Tian ZHANG.
High Efficiency Polar coding key reconciliation scheme in wireless channel
[J]. The Journal of China Universities of Posts and Telecommunications, 2019, 26(3): 50-55.
|
[14] |
Yi-Lei CUI Le-You Zhang.
Privacy preserving ciphertext-policy attribute-based broadcast encryption in smart city
[J]. The Journal of China Universities of Posts and Telecommunications, 2019, 26(1): 21-31.
|
[15] |
.
Two-party certificateless authenticated key agreement protocol with enhanced security
[J]. The Journal of China Universities of Posts and Telecommunications, 2019, 26(1): 12-20.
|