[1] |
QING Xinyi, CHEN Yuling, ZHOU Zhengqiang, TU Yuanchao, LI Tao.
Blockchain storage expansion model based on Chinese remainder theorem
[J]. Journal of Computer Applications, 2021, 41(7): 1977-1982.
|
[2] |
YANG Longhai, WANG Xueyuan, JIANG Hesong.
Blockchain digital signature scheme with improved SM2 signature method
[J]. Journal of Computer Applications, 2021, 41(7): 1983-1988.
|
[3] |
GU Zhengchuan, GUO Yuanbo, FANG Chen.
End-to-end security solution for message queue telemetry transport protocol based on proxy re-encryption
[J]. Journal of Computer Applications, 2021, 41(5): 1378-1385.
|
[4] |
CHENG Yage, JIA Zhijuan, HU Mingsheng, GONG Bei, WANG Lipeng.
Threshold signature scheme suitable for blockchain electronic voting scenes
[J]. Journal of Computer Applications, 2019, 39(9): 2629-2635.
|
[5] |
CHEN Hong, LIU Yumeng, XIAO Chenglong, GUO Pengfei, XIAO Zhenjiu.
Improved RC4 algorithm based on elliptic curve
[J]. Journal of Computer Applications, 2019, 39(8): 2339-2345.
|
[6] |
SHI Zhicai, WANG Yihan, ZHANG Xiaomei, CHEN Shanshan, CHEN Jiwei.
Provable radio frequency identification authentication protocol with scalability
[J]. Journal of Computer Applications, 2019, 39(3): 774-778.
|
[7] |
QIN Pingle, LI Qi, ZENG Jianchao, ZHANG Na, SONG Yulong.
Image retrieval algorithm for pulmonary nodules based on multi-scale dense network
[J]. Journal of Computer Applications, 2019, 39(2): 392-397.
|
[8] |
WANG Yan, HOU Zhengfeng, ZHANG Xueqi, HUANG Mengjie.
Dynamic threshold signature scheme based on Chinese remainder theorem
[J]. Journal of Computer Applications, 2018, 38(4): 1041-1045.
|
[9] |
ZHOU Zhicheng, LI Lixin, LI Zuohui.
Efficient cross-domain authentication scheme based on blockchain technology
[J]. Journal of Computer Applications, 2018, 38(2): 316-320.
|
[10] |
LU Jintian, YAO Lili, HE Xudong, MENG Bo.
Improvement of OpenID Connect protocol and its security analysis
[J]. Journal of Computer Applications, 2017, 37(5): 1347-1352.
|
[11] |
ZENG Xiaofei, LU Jianzhu, WANG Jie.
Broadcast authentication using cooperative sensor nodes
[J]. Journal of Computer Applications, 2016, 36(8): 2219-2224.
|
[12] |
LI Yun, CHEN Pangsen, SUN Shanlin.
Security analysis and implementation for wireless local area network access protocol via near field communication authentication
[J]. Journal of Computer Applications, 2016, 36(5): 1236-1245.
|
[13] |
TAO Yuan, ZHOU Xi, MA Yupeng, ZHAO Fan.
Mobile mutual authentication protocol based on Hash function
[J]. Journal of Computer Applications, 2016, 36(3): 657-660.
|
[14] |
HAN Guoliang, SHENG Maojia, BAO Congxiao, LI Xing.
Stateless communication mechanism between an IPv4 network and the IPv6 Internet
[J]. Journal of Computer Applications, 2015, 35(8): 2113-2117.
|
[15] |
ZUO Liming, CHEN Renqun, GUO Hongli.
Provable identity-based signcryption scheme
[J]. Journal of Computer Applications, 2015, 35(3): 712-716.
|