[1] |
Yangnan GUO, Wenbao JIANG, Shuai YE.
Supervisable blockchain anonymous transaction system model
[J]. Journal of Computer Applications, 2022, 42(9): 2757-2764.
|
[2] |
Jingyu SUN, Jiayu ZHU, Ziqiang TIAN, Guozhen SHI, Chuanjiang GUAN.
Attribute based encryption scheme based on elliptic curve cryptography and supporting revocation
[J]. Journal of Computer Applications, 2022, 42(7): 2094-2103.
|
[3] |
Chao LIN, Debiao HE, Xinyi HUANG.
Blockchain‑based electronic medical record secure sharing
[J]. Journal of Computer Applications, 2022, 42(11): 3465-3472.
|
[4] |
Hexiong CHEN, Yuwei LUO, Yunkai WEI, Wei GUO, Feilu HANG, Zhengxiong MAO, Zhenhong ZHANG, Yingjun HE, Zhenyu LUO, Linjiang XIE, Ning YANG.
Blockchain-based data frame security verification mechanism in software defined network
[J]. Journal of Computer Applications, 2022, 42(10): 3074-3083.
|
[5] |
YANG Longhai, WANG Xueyuan, JIANG Hesong.
Blockchain digital signature scheme with improved SM2 signature method
[J]. Journal of Computer Applications, 2021, 41(7): 1983-1988.
|
[6] |
GU Zhengchuan, GUO Yuanbo, FANG Chen.
End-to-end security solution for message queue telemetry transport protocol based on proxy re-encryption
[J]. Journal of Computer Applications, 2021, 41(5): 1378-1385.
|
[7] |
Guangfu WU, Ziheng DAI.
Cascaded quasi-cyclic moderate-density parity-check code based public key scheme for resisting reaction attack
[J]. Journal of Computer Applications, 2021, 41(11): 3274-3280.
|
[8] |
ZHANG Qi, NIE Xuyun.
MinRank analysis of cubic multivariate public key cryptosystem
[J]. Journal of Computer Applications, 2020, 40(7): 1965-1969.
|
[9] |
CHEN Hong, LIU Yumeng, XIAO Chenglong, GUO Pengfei, XIAO Zhenjiu.
Improved RC4 algorithm based on elliptic curve
[J]. Journal of Computer Applications, 2019, 39(8): 2339-2345.
|
[10] |
ZHOU Yang, WU Qiwu, JIANG Lingzhi.
Group key management scheme based on distributed path computing element in multi-domain optical network
[J]. Journal of Computer Applications, 2019, 39(4): 1095-1099.
|
[11] |
LIU Xindong, XU Shuishuai, CHEN Jianhua.
Authentication scheme for smart grid communication based on elliptic curve cryptography
[J]. Journal of Computer Applications, 2019, 39(3): 779-783.
|
[12] |
CAO Zhenhuan, GU Xiaozhuo, GU Menghe.
Certificateless authentication group key agreement protocol for Ad Hoc networks
[J]. Journal of Computer Applications, 2019, 39(2): 476-482.
|
[13] |
LIU Xiangxin, YANG Xiaoyuan.
Improvement of Niederreiter public key cryptosystem
[J]. Journal of Computer Applications, 2018, 38(7): 1956-1959.
|
[14] |
ZHOU Zhicheng, LI Lixin, LI Zuohui.
Efficient cross-domain authentication scheme based on blockchain technology
[J]. Journal of Computer Applications, 2018, 38(2): 316-320.
|
[15] |
XU Hailin, LU Yang.
Efficient bilinear-pairing-free certificate-based encryption scheme with keyword search
[J]. Journal of Computer Applications, 2018, 38(2): 379-385.
|