[1] |
Yangnan GUO, Wenbao JIANG, Shuai YE.
Supervisable blockchain anonymous transaction system model
[J]. Journal of Computer Applications, 2022, 42(9): 2757-2764.
|
[2] |
Wei LIU, Cong ZHANG, Wei SHE, Xuan SONG, Zhao TIAN.
Data trusted traceability method based on Merkle mountain range
[J]. Journal of Computer Applications, 2022, 42(9): 2765-2771.
|
[3] |
Hongliang TIAN, Jiayue WANG, Chenxi LI.
Data storage scheme based on hybrid algorithm blockchain and node identity authentication
[J]. Journal of Computer Applications, 2022, 42(8): 2481-2486.
|
[4] |
Xu WANG, Yumin SHEN, Xiaoyun XIONG, Peng LI, Jinlong WANG.
Data management method for building internet of things based on Hashgraph
[J]. Journal of Computer Applications, 2022, 42(8): 2471-2480.
|
[5] |
Jie ZHANG, Shanshan XU, Lingyun YUAN.
Internet of things access control model based on blockchain and edge computing
[J]. Journal of Computer Applications, 2022, 42(7): 2104-2111.
|
[6] |
Chunming TANG, Yuqing CHEN, Zidi ZHANG.
Improved consensus algorithm based on binomial swap forest and HotStuff
[J]. Journal of Computer Applications, 2022, 42(7): 2112-2117.
|
[7] |
Zheng DI, Yifan CAO, Chao QIU, Tao LUO, Xiaofei WANG.
New computing power network architecture and application case analysis
[J]. Journal of Computer Applications, 2022, 42(6): 1656-1661.
|
[8] |
Yang LI, Long XU, Yanqiang LI, Shaopeng LI.
Smart contract-based access control architecture and verification for internet of things
[J]. Journal of Computer Applications, 2022, 42(6): 1922-1931.
|
[9] |
Yuntao XU, Junwu ZHU, Binwen SUN, Maosheng SUN, Sihai CHEN.
Election-based supply chain: a supply chain autonomy framework based on blockchain
[J]. Journal of Computer Applications, 2022, 42(6): 1770-1775.
|
[10] |
Xiuli REN, Lei ZHANG.
Improved multi-primary-node consensus mechanism based on practical Byzantine fault tolerance
[J]. Journal of Computer Applications, 2022, 42(5): 1500-1507.
|
[11] |
Jiagui XIE, Zhiping LI, Jian JIN.
Cross-chain mechanism based on Spark blockchain
[J]. Journal of Computer Applications, 2022, 42(2): 519-527.
|
[12] |
Chuyu JIANG, Lixi FANG, Ning ZHANG, Jianming ZHU.
Cross-chain interaction safety model based on notary groups
[J]. Journal of Computer Applications, 2022, 42(11): 3438-3443.
|
[13] |
Shanshan LI, Yanze WANG, Yinglong ZOU, Huanlei CHEN, He ZHANG, Ou WU.
Consensus transaction trajectory visualization tracking method for Fabric based on custom logs
[J]. Journal of Computer Applications, 2022, 42(11): 3421-3428.
|
[14] |
Yazhou HUA, Linlin DING, Ze CHEN, Junlu WANG, Zhu ZHU.
Blockchain construction and query method for spatio‑temporal data
[J]. Journal of Computer Applications, 2022, 42(11): 3429-3437.
|
[15] |
Rui SUN, Chao LI, Wei WANG, Endong TONG, Jian WANG, Jiqiang LIU.
Research progress of blockchain‑based federated learning
[J]. Journal of Computer Applications, 2022, 42(11): 3413-3420.
|