[1] |
XU Liyun, YAN Tao, QIAN Yuhua.
Audio encryption algorithm in fractional domain based on cascaded chaotic system
[J]. Journal of Computer Applications, 2021, 41(9): 2623-2630.
|
[2] |
YANG Longhai, WANG Xueyuan, JIANG Hesong.
Blockchain digital signature scheme with improved SM2 signature method
[J]. Journal of Computer Applications, 2021, 41(7): 1983-1988.
|
[3] |
TANG Andi, HAN Tong, XU Dengwu, XIE Lei.
Path planning method of unmanned aerial vehicle based on chaos sparrow search algorithm
[J]. Journal of Computer Applications, 2021, 41(7): 2128-2136.
|
[4] |
CHEN Jiahao, YIN Xinchun.
Traceable and revocable ciphertext-policy attribute-based encryption scheme based on cloud-fog computing
[J]. Journal of Computer Applications, 2021, 41(6): 1611-1620.
|
[5] |
ZHENG Shangwen, LIU Yao, ZHOU Tanping, YANG Xiaoyuan.
Optimized CKKS scheme based on learning with errors problem
[J]. Journal of Computer Applications, 2021, 41(6): 1723-1728.
|
[6] |
GU Zhengchuan, GUO Yuanbo, FANG Chen.
End-to-end security solution for message queue telemetry transport protocol based on proxy re-encryption
[J]. Journal of Computer Applications, 2021, 41(5): 1378-1385.
|
[7] |
ZHANG Lihua, WANG Xinyi, HU Fangzhou, HUANG Yang, BAI Jiayi.
Data sharing model of smart grid based on double consortium blockchains
[J]. Journal of Computer Applications, 2021, 41(4): 963-969.
|
[8] |
ZHANG Xuewang, YIN Zijie, FENG Jiaqi, YE Caijin, FU Kang.
Data trading scheme based on blockchain and trusted computing
[J]. Journal of Computer Applications, 2021, 41(4): 939-944.
|
[9] |
LI Shanshan, ZHAO Li, ZHANG Hongli.
Image grey level encryption based on cat map
[J]. Journal of Computer Applications, 2021, 41(4): 1148-1152.
|
[10] |
QIN Jing, AN Wen, JI Changqing, WANG Zumin.
Review of privacy protection mechanisms in wireless body area network
[J]. Journal of Computer Applications, 2021, 41(4): 970-975.
|
[11] |
SHEN Ziyi, WANG Weiya, JIANG Donghua, RONG Xianwei.
Visual image encryption algorithm based on Hopfield chaotic neural network and compressive sensing
[J]. Journal of Computer Applications, 2021, 41(10): 2893-2899.
|
[12] |
MA Minyao, LIU Zhuo, XU Yi, WU Lian.
Private-preserving determination problem of integer-interval positional relationship
[J]. Journal of Computer Applications, 2020, 40(9): 2657-2664.
|
[13] |
XU Qiuyan, MA Liang, LIU Yong.
Yin-Yang-pair optimization algorithm based on chaos search and intricate operator
[J]. Journal of Computer Applications, 2020, 40(8): 2305-2312.
|
[14] |
MA Minyao, WU Lian, LIU Zhuo, XU Yi.
Privacy-preserving determination of integer point-interval relationship
[J]. Journal of Computer Applications, 2020, 40(7): 1983-1988.
|
[15] |
CHE Xiaoliang, ZHOU Haonan, ZHOU Tanping, LI Ningbo, YANG Xiaoyuan.
Decryption structure of multi-key homomorphic encryption scheme based on NTRU
[J]. Journal of Computer Applications, 2020, 40(7): 1959-1964.
|