[1] |
Luo Zhiyong, Wang Shuyi, Song Weiwei, Liu Jiahui, Wang Jianming.
Research on security situation awareness algorithm of Markov differential game block-chain model
[J]. The Journal of China Universities of Posts and Telecommunications, 2023, 30(4): 105-120.
|
[2] |
Han Yushan, Che Bichen, Liu Jiali, Dou Zhao, Di Junyu.
Nearly universal and efficient quantum secure multi-party computation protocol
[J]. The Journal of China Universities of Posts and Telecommunications, 2022, 29(4): 51-68.
|
[3] |
刘巧 唐碧华 Chen Xue Fan Wu 范文浩.
Multi-level sharded blockchain system for edge computing
[J]. The Journal of China Universities of Posts and Telecommunications, 2021, 28(5): 46-58.
|
[4] |
Zhao Guosheng, Liu Dongmei, Wang Jian.
Cloud security situation prediction method based on grey wolf optimization and BP neural network
[J]. The Journal of China Universities of Posts and Telecommunications, 2020, 27(6): 30-41.
|
[5] |
Lin Jie, Liu Chuanyi, Fang Binxing.
VMScan: an out-of-VM malware scanner
[J]. The Journal of China Universities of Posts and Telecommunications, 2020, 27(4): 59-68.
|
[6] |
.
Improved authenticated key agreement protocol based on Bi-ISIS problem
[J]. The Journal of China Universities of Posts and Telecommunications, 2020, 27(3): 93-102.
|
[7] |
.
End-to-end encrypted network traffic classification method based on deep learning
[J]. The Journal of China Universities of Posts and Telecommunications, 2020, 27(3): 21-30.
|
[8] |
Wei Rongyu, Nie Min, Yang Guang, Zhang Meiling, Sun Aijing, Pei Changx.
Parameters and performance analysis of quantum wireless sensor network for monitoring the activities of tibetan antelope in Hoh Xil
[J]. The Journal of China Universities of Posts and Telecommunications, 2019, 26(6): 11-19.
|
[9] |
Li Lintao, Liu Yuanan.
Physical layer security enhanced system with
under-sampling spectrum-sparse signals
[J]. The Journal of China Universities of Posts and Telecommunications, 2019, 26(4): 8-16.
|
[10] |
xiao-Tian ZHANG.
High Efficiency Polar coding key reconciliation scheme in wireless channel
[J]. The Journal of China Universities of Posts and Telecommunications, 2019, 26(3): 50-55.
|
[11] |
Yi-Lei CUI Le-You Zhang.
Privacy preserving ciphertext-policy attribute-based broadcast encryption in smart city
[J]. The Journal of China Universities of Posts and Telecommunications, 2019, 26(1): 21-31.
|
[12] |
.
Two-party certificateless authenticated key agreement protocol with enhanced security
[J]. The Journal of China Universities of Posts and Telecommunications, 2019, 26(1): 12-20.
|
[13] |
Yang Chen.
Consortium blockchains-based deep deterministic policy gradient algorithm for optimal electricity trading among households
[J]. JOURNAL OF CHINA UNIVERSITIES OF POSTS AND TELECOM, 2018, 25(6): 7-20.
|
[14] |
.
Security of account and privacy of transaction for bitcoin
[J]. JOURNAL OF CHINA UNIVERSITIES OF POSTS AND TELECOM, 2018, 25(5): 20-30.
|
[15] |
Zhang Junsong, Jiang Yongcong, Gan Yong, Zhang Qikun.
Bilinear pair based authentication protocol for wireless medical sensor network
[J]. JOURNAL OF CHINA UNIVERSITIES OF POSTS AND TELECOM, 2018, 25(2): 28-38.
|