[1] |
YANG Longhai, WANG Xueyuan, JIANG Hesong.
Blockchain digital signature scheme with improved SM2 signature method
[J]. Journal of Computer Applications, 2021, 41(7): 1983-1988.
|
[2] |
GU Zhengchuan, GUO Yuanbo, FANG Chen.
End-to-end security solution for message queue telemetry transport protocol based on proxy re-encryption
[J]. Journal of Computer Applications, 2021, 41(5): 1378-1385.
|
[3] |
WANG Yunye, CHENG Yage, JIA Zhijuan, FU Junjun, YANG Yanyan, HE Yuchu, MA Wei.
Auditable signature scheme for blockchain based on secure multi-party
[J]. Journal of Computer Applications, 2020, 40(9): 2639-2645.
|
[4] |
LI Jing, JING Xu, YANG Huijun.
Blockchain electronic counting scheme based on practical Byzantine fault tolerance algorithm
[J]. Journal of Computer Applications, 2020, 40(4): 954-960.
|
[5] |
SHI Zhiliang, CAI Wangyue, WANG Guoqiang, XIONG Linjie.
Intrinsic shape signature algorithm based on adaptive neighborhood
[J]. Journal of Computer Applications, 2020, 40(4): 1151-1156.
|
[6] |
SHEN Liang, WANG Xin, CHEN Shuhui.
Structural signature extraction method for mobile application recognition
[J]. Journal of Computer Applications, 2020, 40(4): 1109-1114.
|
[7] |
CHENG Yage, JIA Zhijuan, HU Mingsheng, GONG Bei, WANG Lipeng.
Threshold signature scheme suitable for blockchain electronic voting scenes
[J]. Journal of Computer Applications, 2019, 39(9): 2629-2635.
|
[8] |
ZUO Liming, HU Kaiyu, ZHANG Mengli, CHEN Lanlan.
Data transmission protocol based on short signature scheme for railway bridge monitoring
[J]. Journal of Computer Applications, 2018, 38(8): 2261-2266.
|
[9] |
WANG Yan, HOU Zhengfeng, ZHANG Xueqi, HUANG Mengjie.
Dynamic threshold signature scheme based on Chinese remainder theorem
[J]. Journal of Computer Applications, 2018, 38(4): 1041-1045.
|
[10] |
LI Zhen, NIU Jun, WANG Kui, XIN Yuanyuan.
Optimization of source code search based on multi-feature weight assignment
[J]. Journal of Computer Applications, 2018, 38(3): 812-817.
|
[11] |
ZHOU Zhicheng, LI Lixin, LI Zuohui.
Efficient cross-domain authentication scheme based on blockchain technology
[J]. Journal of Computer Applications, 2018, 38(2): 316-320.
|
[12] |
ZHONG Ya, GUO Yuanbo.
Design and implementation of log parsing system based on machine learning
[J]. Journal of Computer Applications, 2018, 38(2): 352-356.
|
[13] |
ZUO Liming, CHEN Zuosong, XIA Pingping, YI Chuanjia.
Efficient and provably secure short proxy signature scheme
[J]. Journal of Computer Applications, 2018, 38(12): 3455-3461.
|
[14] |
LU Jintian, YAO Lili, HE Xudong, MENG Bo.
Improvement of OpenID Connect protocol and its security analysis
[J]. Journal of Computer Applications, 2017, 37(5): 1347-1352.
|
[15] |
LI Yang, LI Qing, ZHANG Xia.
Automatic protocol format signature construction algorithm based on discrete series protocol message
[J]. Journal of Computer Applications, 2017, 37(4): 954-959.
|