[1] |
XIAO Yuelei, DENG Xiaofan.
Improvement and analysis of certificate-based wired local area network security association scheme
[J]. Journal of Computer Applications, 2021, 41(7): 1970-1976.
|
[2] |
ZHANG Xuewang, YIN Zijie, FENG Jiaqi, YE Caijin, FU Kang.
Data trading scheme based on blockchain and trusted computing
[J]. Journal of Computer Applications, 2021, 41(4): 939-944.
|
[3] |
WANG Yunye, CHENG Yage, JIA Zhijuan, FU Junjun, YANG Yanyan, HE Yuchu, MA Wei.
Auditable signature scheme for blockchain based on secure multi-party
[J]. Journal of Computer Applications, 2020, 40(9): 2639-2645.
|
[4] |
WANG Zhiheng, XU Yanyan.
Design and implementation of fingerprint authentication terminal APP in mobile cloud environment based on TrustZone
[J]. Journal of Computer Applications, 2020, 40(11): 3255-3260.
|
[5] |
SHEN Xueli, LI Zijian, HE Chenhao.
Hybrid recommendation algorithm based on rating filling and trust information
[J]. Journal of Computer Applications, 2020, 40(10): 2789-2794.
|
[6] |
XIE Lixia, WEI Ruixin.
Dynamic trust evaluation method for IoT nodes
[J]. Journal of Computer Applications, 2019, 39(9): 2597-2603.
|
[7] |
WANG Haiyong, PENG Yao, GUO Kaixuan.
CP-ABE access control scheme based on proxy re-encryption in cloud storage
[J]. Journal of Computer Applications, 2019, 39(9): 2611-2616.
|
[8] |
MA Fangfang, LIU Shubo, XIONG Xingxing, NIU Xiaoguang.
Privacy protection based on local differential privacy for numerical sensitive data of wearable devices
[J]. Journal of Computer Applications, 2019, 39(7): 1985-1990.
|
[9] |
JIA Mengyao, WANG Xingwei, ZHANG Shuang, YI Bo, HUANG Min.
Software defined network based fault tolerant routing mechanism for satellite networks
[J]. Journal of Computer Applications, 2019, 39(6): 1772-1779.
|
[10] |
WANG Lei, REN Hang, GONG Kai.
Social recommendation method based on multi-dimensional trust and collective matrix factorization
[J]. Journal of Computer Applications, 2019, 39(5): 1269-1274.
|
[11] |
CAO Didi, CHEN Wei.
Mechanism of trusted storage in Ethereum based on smart contract
[J]. Journal of Computer Applications, 2019, 39(4): 1073-1080.
|
[12] |
LIU Xindong, XU Shuishuai, CHEN Jianhua.
Authentication scheme for smart grid communication based on elliptic curve cryptography
[J]. Journal of Computer Applications, 2019, 39(3): 779-783.
|
[13] |
WANG Yaqiong, SHI Guozhen, XIE Rongna, LI Fenghua, WANG Yazhe.
Multi-authority access control scheme with policy hiding of satellite network
[J]. Journal of Computer Applications, 2019, 39(2): 470-475.
|
[14] |
TIAN Baojun, YANG Huyun, FANG Jiandong.
Recommendation algorithm based on probability matrix factorization and fusing trust
[J]. Journal of Computer Applications, 2019, 39(10): 2834-2840.
|
[15] |
XU Lingling, QU Zhijian, XU Hongbo, CAO Xiaowei, LIU Xiaohong.
Euclidean embedding recommendation algorithm by fusing trust information
[J]. Journal of Computer Applications, 2019, 39(10): 2829-2833.
|