[1] |
ZUO Liming, HU Kaiyu, ZHANG Mengli, CHEN Lanlan.
Data transmission protocol based on short signature scheme for railway bridge monitoring
[J]. Journal of Computer Applications, 2018, 38(8): 2261-2266.
|
[2] |
SU Jingfeng, LIU Juxia.
Efficient certificateless aggregate signcryption scheme without bilinear pairings
[J]. Journal of Computer Applications, 2018, 38(2): 374-378.
|
[3] |
XU Hailin, LU Yang.
Efficient bilinear-pairing-free certificate-based encryption scheme with keyword search
[J]. Journal of Computer Applications, 2018, 38(2): 379-385.
|
[4] |
ZUO Liming, CHEN Zuosong, XIA Pingping, YI Chuanjia.
Efficient and provably secure short proxy signature scheme
[J]. Journal of Computer Applications, 2018, 38(12): 3455-3461.
|
[5] |
LI Haoyu, ZHANG Longjun, LI Qingpeng.
Dynamic provable data possession scheme based on B+ tree
[J]. Journal of Computer Applications, 2017, 37(7): 1931-1935.
|
[6] |
JIANG Tiejin, REN Yanli.
Secure outsourcing algorithm of bilinear pairings with single server
[J]. Journal of Computer Applications, 2016, 36(7): 1866-1869.
|
[7] |
LIU Jianhua, MAO Kefei, HU Junwei.
Certificateless aggregate signcryption scheme based on bilinear pairings
[J]. Journal of Computer Applications, 2016, 36(6): 1558-1562.
|
[8] |
XU Hailin, CHEN Ying, LU Yang.
Efficient certificate-based proxy re-encryption scheme without bilinear pairings
[J]. Journal of Computer Applications, 2016, 36(5): 1250-1256.
|
[9] |
REN Xiaokang, CHEN Peilin, CAO Yuan, LI Yanan, YANG Xiaodong.
Partially blind signature scheme with ID-based server-aided verification
[J]. Journal of Computer Applications, 2016, 36(11): 3098-3102.
|
[10] |
WANG Xiong, DENG Lunzhi.
Provably secure undeniable signature scheme based on identity
[J]. Journal of Computer Applications, 2016, 36(10): 2738-2741.
|
[11] |
ZUO Liming, GUO Hongli, ZHANG Tingting, CHEN Zuosong.
Improved certificate-based aggregate proxy signature scheme
[J]. Journal of Computer Applications, 2016, 36(10): 2758-2761.
|
[12] |
MING Yang, YUAN Hongping, SUN Bian, QIAO Zhengyang.
Efficient identity-based anonymous broadcast encryption scheme in standard model
[J]. Journal of Computer Applications, 2016, 36(10): 2762-2766.
|
[13] |
HUANG Ping, YANG Xiaodong, LI Yan, WANG Caifen.
Identity-based proxy re-signature scheme without bilinear pairing
[J]. Journal of Computer Applications, 2015, 35(6): 1678-1682.
|
[14] |
LIU Dan, SHI Runhua, ZHONG Hong, ZHANG Shun, CUI Jie, XU Yan.
Conditional privacy-preserving authentication scheme for vehicular Ad Hoc network
[J]. Journal of Computer Applications, 2015, 35(5): 1385-1392.
|
[15] |
YUAN Simin, MA Chuangui, XIANG Shengqi.
Identity-based group key exchange protocol for unbalanced network environment
[J]. Journal of Computer Applications, 2015, 35(5): 1399-1405.
|