[1] |
MA Hua, CHEN Yuepeng, TANG Wensheng, LOU Xiaoping, HUANG Zhuoxuan.
Survey of research progress on crowdsourcing task assignment for evaluation of workers’ ability
[J]. Journal of Computer Applications, 2021, 41(8): 2232-2241.
|
[2] |
DU Xinyu, WANG Huaqun.
Dynamic group based effective identity authentication and key agreement scheme in LTE-A networks
[J]. Journal of Computer Applications, 2021, 41(6): 1715-1722.
|
[3] |
Ping ZHANG, Yiqiao JIA, Jiechang WANG, Nianfeng SHI.
Three-factor anonymous authentication and key agreement protocol
[J]. Journal of Computer Applications, 2021, 41(11): 3281-3287.
|
[4] |
XIAO Kai, WANG Meng, TANG Xinyu, JIANG Tonghai.
Public welfare time bank system based on blockchain technology
[J]. Journal of Computer Applications, 2019, 39(7): 2156-2161.
|
[5] |
ZENG Jianping, CHEN Qile, WU Chengrong, FANG Xi.
Analysis method of passwords under Chinese context
[J]. Journal of Computer Applications, 2019, 39(6): 1713-1718.
|
[6] |
LIU Xindong, XU Shuishuai, CHEN Jianhua.
Authentication scheme for smart grid communication based on elliptic curve cryptography
[J]. Journal of Computer Applications, 2019, 39(3): 779-783.
|
[7] |
LUO Xiaofeng, YANG Xingchun, HU Yong.
Improved decision diagram for attribute-based access control policy evaluation and management
[J]. Journal of Computer Applications, 2019, 39(12): 3569-3574.
|
[8] |
CAO Zhenhuan, CAI Xiaohai, GU Menghe, GU Xiaozhuo, LI Xiaowei.
Android permission management and control scheme based on access control list mechanism
[J]. Journal of Computer Applications, 2019, 39(11): 3316-3322.
|
[9] |
ZHU Zhu, FU Xiao, WANG Zhijian.
Stealth download hijacking vulnerability of Android application package
[J]. Journal of Computer Applications, 2018, 38(9): 2549-2553.
|
[10] |
LI Zhaobin, LI Weilong, WEI Zhanzhen, LIU Mengtian.
Research and implementation of key module of data security processing mechanism in software defined network
[J]. Journal of Computer Applications, 2018, 38(7): 1929-1935.
|
[11] |
ZHOU Zhicheng, LI Lixin, GUO Song, LI Zuohui.
Biometric and password two-factor cross domain authentication scheme based on blockchain technology
[J]. Journal of Computer Applications, 2018, 38(6): 1620-1627.
|
[12] |
SONG Chuangchuang, FANG Yong, HUANG Cheng, LIU Liang.
Password strength estimation model based on ensemble learning
[J]. Journal of Computer Applications, 2018, 38(5): 1383-1388.
|
[13] |
DAI Chengrui, CHEN Wei.
Defense strategy against browser cache pollution
[J]. Journal of Computer Applications, 2018, 38(3): 693-698.
|
[14] |
WANG Songwei, CHEN Jianhua.
Multi-factor authentication key agreement scheme based on chaotic mapping
[J]. Journal of Computer Applications, 2018, 38(10): 2940-2944.
|
[15] |
LUO Xiaoshuang, YANG Xiaoyuan, WANG Xu'an.
A private set intersection protocol against malicious attack
[J]. Journal of Computer Applications, 2017, 37(6): 1593-1598.
|