[1] |
YANG Longhai, WANG Xueyuan, JIANG Hesong.
Blockchain digital signature scheme with improved SM2 signature method
[J]. Journal of Computer Applications, 2021, 41(7): 1983-1988.
|
[2] |
GU Zhengchuan, GUO Yuanbo, FANG Chen.
End-to-end security solution for message queue telemetry transport protocol based on proxy re-encryption
[J]. Journal of Computer Applications, 2021, 41(5): 1378-1385.
|
[3] |
RAN Jiamin, NI Zhiwei, PENG Peng, ZHU Xuhui.
Task allocation strategy considering service quality of spatial crowdsourcing workers and its glowworm swarm optimization algorithm solution
[J]. Journal of Computer Applications, 2021, 41(3): 794-802.
|
[4] |
WANG Yunye, CHENG Yage, JIA Zhijuan, FU Junjun, YANG Yanyan, HE Yuchu, MA Wei.
Auditable signature scheme for blockchain based on secure multi-party
[J]. Journal of Computer Applications, 2020, 40(9): 2639-2645.
|
[5] |
LI Jing, JING Xu, YANG Huijun.
Blockchain electronic counting scheme based on practical Byzantine fault tolerance algorithm
[J]. Journal of Computer Applications, 2020, 40(4): 954-960.
|
[6] |
SHI Zhiliang, CAI Wangyue, WANG Guoqiang, XIONG Linjie.
Intrinsic shape signature algorithm based on adaptive neighborhood
[J]. Journal of Computer Applications, 2020, 40(4): 1151-1156.
|
[7] |
SHEN Liang, WANG Xin, CHEN Shuhui.
Structural signature extraction method for mobile application recognition
[J]. Journal of Computer Applications, 2020, 40(4): 1109-1114.
|
[8] |
CHENG Yage, JIA Zhijuan, HU Mingsheng, GONG Bei, WANG Lipeng.
Threshold signature scheme suitable for blockchain electronic voting scenes
[J]. Journal of Computer Applications, 2019, 39(9): 2629-2635.
|
[9] |
ZUO Liming, HU Kaiyu, ZHANG Mengli, CHEN Lanlan.
Data transmission protocol based on short signature scheme for railway bridge monitoring
[J]. Journal of Computer Applications, 2018, 38(8): 2261-2266.
|
[10] |
LIU Yukun, ZHUGE Jianwei, WU Yixiong.
Threat and defense of new ransomware worm in industrial control system
[J]. Journal of Computer Applications, 2018, 38(6): 1608-1613.
|
[11] |
WANG Yan, HOU Zhengfeng, ZHANG Xueqi, HUANG Mengjie.
Dynamic threshold signature scheme based on Chinese remainder theorem
[J]. Journal of Computer Applications, 2018, 38(4): 1041-1045.
|
[12] |
JIA Shengbin, XIANG Yang.
Temporal semantic understanding for intelligent service systems
[J]. Journal of Computer Applications, 2018, 38(3): 620-625.
|
[13] |
LI Zhen, NIU Jun, WANG Kui, XIN Yuanyuan.
Optimization of source code search based on multi-feature weight assignment
[J]. Journal of Computer Applications, 2018, 38(3): 812-817.
|
[14] |
ZHOU Zhicheng, LI Lixin, LI Zuohui.
Efficient cross-domain authentication scheme based on blockchain technology
[J]. Journal of Computer Applications, 2018, 38(2): 316-320.
|
[15] |
ZHONG Ya, GUO Yuanbo.
Design and implementation of log parsing system based on machine learning
[J]. Journal of Computer Applications, 2018, 38(2): 352-356.
|