[1] |
WU Kaifan, YIN Xinchun.
Lightweight anonymous mutual authentication protocol based on random operators for radio frequency identification system
[J]. Journal of Computer Applications, 2021, 41(6): 1621-1630.
|
[2] |
BAO Yulong, ZHU Xueyang, ZHANG Wenhui, SUN Pengfei, ZHAO Yingqi.
Formal verification of smart contract for access control in IoT applications
[J]. Journal of Computer Applications, 2021, 41(4): 930-938.
|
[3] |
LI Xiuyan, LIU Mingxi, SHI Wenbo, DONG Guofang.
Efficient dynamic data audit scheme for resource-constrained users
[J]. Journal of Computer Applications, 2021, 41(2): 422-432.
|
[4] |
ZHANG Linghao, WANG Sheng, ZHOU Hui, CHEN Yifan, GUI Shenglin.
Secure communication scheme of unmanned aerial vehicle system based on MAVLink protocol
[J]. Journal of Computer Applications, 2020, 40(8): 2286-2292.
|
[5] |
PAN Guoteng, OU Guodong, CHAO Zhanghu, LI Mengjun.
Design and implementation of Lite register model
[J]. Journal of Computer Applications, 2020, 40(5): 1369-1373.
|
[6] |
SUN Peng, XIAO Jing, ZHAO Haimeng, LIU Fan, YAN Lei, ZHAO Hongying.
Design and implementation of SIFT algorithm for UAV remote sensing image based on DSP platform
[J]. Journal of Computer Applications, 2020, 40(4): 1237-1242.
|
[7] |
QIN Biao, GUO Fan, TU Fengtao.
Correctness verification of static taint analysis results for Android application
[J]. Journal of Computer Applications, 2019, 39(10): 3018-3027.
|
[8] |
SHEN Minjie, ZENG Zhenbing, LIN Wang, YANG Zhengfeng.
Safety verification of stochastic continuous system using stochastic barrier certificates
[J]. Journal of Computer Applications, 2018, 38(6): 1737-1744.
|
[9] |
XU Mingdi, GAO Yang, GAO Xueyuan, ZHANG Fan.
Correspondence property-based platform configuration attestation
[J]. Journal of Computer Applications, 2018, 38(2): 337-342.
|
[10] |
JIA Shangkun, HE Fei.
Software regression verification based on witness automata
[J]. Journal of Computer Applications, 2018, 38(10): 2990-2995.
|
[11] |
XU Xin, LIANG Jiuzhen.
Unconstrained face verification based on 3D frontalization and similarity learning
[J]. Journal of Computer Applications, 2018, 38(10): 2788-2793.
|
[12] |
LI Sai, LI Xiaoyu.
Mobile secure payment solution based on encrypted SMS verification code
[J]. Journal of Computer Applications, 2017, 37(8): 2270-2274.
|
[13] |
TANG Guofei, ZHOU Haifang, TAN Qingping.
Design and implementation of space-borne parallel remote sensing image compression system based on multi-core DSP
[J]. Journal of Computer Applications, 2017, 37(5): 1246-1250.
|
[14] |
LIU Wei, WANG Yang, ZHENG Jianbin, ZHAN Enqi.
Chinese signature authentication based on accelerometer
[J]. Journal of Computer Applications, 2017, 37(4): 1004-1007.
|
[15] |
HU Xiaoyan, WANG Jingyu, LI Hairong.
Range query authentication for outsourced spatial databases
[J]. Journal of Computer Applications, 2017, 37(4): 1021-1025.
|