[1] |
BAO Yulong, ZHU Xueyang, ZHANG Wenhui, SUN Pengfei, ZHAO Yingqi.
Formal verification of smart contract for access control in IoT applications
[J]. Journal of Computer Applications, 2021, 41(4): 930-938.
|
[2] |
TIAN Zhihong, ZHAO Jindong.
Overview of blockchain consensus mechanism for internet of things
[J]. Journal of Computer Applications, 2021, 41(4): 917-929.
|
[3] |
ZHANG Lingzhe, HUANG Xiangdong, QIAO Jialin, GOU Wangminhao, WANG Jianmin.
Two-stage file compaction framework by log-structured merge-tree for time series data
[J]. Journal of Computer Applications, 2021, 41(3): 618-622.
|
[4] |
LI Xiuyan, LIU Mingxi, SHI Wenbo, DONG Guofang.
Efficient dynamic data audit scheme for resource-constrained users
[J]. Journal of Computer Applications, 2021, 41(2): 422-432.
|
[5] |
SUN Huan, CHEN Hongbin.
Node redeployment strategy based on firefly algorithm for wireless sensor network
[J]. Journal of Computer Applications, 2021, 41(2): 492-497.
|
[6] |
HU Runyan, LI Cuiran.
Clustering algorithm of energy harvesting wireless sensor network based on fuzzy control
[J]. Journal of Computer Applications, 2020, 40(9): 2691-2697.
|
[7] |
HAN Yulao, FANG Dingyi.
Lightweight coverage hole detection algorithm based on relative position of link intersections
[J]. Journal of Computer Applications, 2020, 40(9): 2698-2705.
|
[8] |
CHENG Xiaohui, NIU Tong, WANG Yanjun.
Wireless sensor network intrusion detection system based on sequence model
[J]. Journal of Computer Applications, 2020, 40(6): 1680-1684.
|
[9] |
SHI Jinshan, LI Ru, SONG Tingting.
Blockchain-based access control framework for Internet of things
[J]. Journal of Computer Applications, 2020, 40(4): 931-941.
|
[10] |
LU Guangyue, ZHOU Liang, LYU Shaoqing, SHI Cong, SU Keke.
Outlier node detection algorithm in wireless sensor networks based ongraph signal processing
[J]. Journal of Computer Applications, 2020, 40(3): 783-787.
|
[11] |
WANG Shuman, LI Aiping, DUAN Liguo, FU Jia, CHEN Yongle.
Service discovery method for Internet of Things based on Biterm topic model
[J]. Journal of Computer Applications, 2020, 40(2): 459-464.
|
[12] |
ZHANG Zhengwan, ZHANG Chunjiong, LI Hongbing, XIE Tao.
Multipath transmission selection algorithm based on immune connectivity model
[J]. Journal of Computer Applications, 2020, 40(12): 3571-3577.
|
[13] |
REN Xiuli, CHEN Yang.
Routing protocol optimized for data transmission delay in wireless sensor networks
[J]. Journal of Computer Applications, 2020, 40(1): 196-201.
|
[14] |
ZHOU Zhen, YUAN Zhengdao.
Efficient communication receiver design for Internet of things environment
[J]. Journal of Computer Applications, 2020, 40(1): 202-206.
|
[15] |
XIE Lixia, WEI Ruixin.
Dynamic trust evaluation method for IoT nodes
[J]. Journal of Computer Applications, 2019, 39(9): 2597-2603.
|