[1] |
QING Xinyi, CHEN Yuling, ZHOU Zhengqiang, TU Yuanchao, LI Tao.
Blockchain storage expansion model based on Chinese remainder theorem
[J]. Journal of Computer Applications, 2021, 41(7): 1977-1982.
|
[2] |
GAO Haoyu, LI Leixiao, LIN Hao, LI Jie, DENG Dan, LI Shaoxu.
Research and application progress of blockchain in area of data integrity protection
[J]. Journal of Computer Applications, 2021, 41(3): 745-755.
|
[3] |
LI Xiuyan, LIU Mingxi, SHI Wenbo, DONG Guofang.
Efficient dynamic data audit scheme for resource-constrained users
[J]. Journal of Computer Applications, 2021, 41(2): 422-432.
|
[4] |
WEI Wenle, JIN Guodong, TAN Lining, LU Libin, CHEN Danqi.
Real-time SLAM algorithm with keyframes determined by inertial measurement unit
[J]. Journal of Computer Applications, 2020, 40(4): 1157-1163.
|
[5] |
LI Zhaobin, LIU Zeyi, WEI Zhanzhen, HAN Yu.
Software defined network path security based on Hash chain
[J]. Journal of Computer Applications, 2019, 39(5): 1368-1373.
|
[6] |
BAI Ping, ZHANG Wei, WANG Xu'an.
Homomorphic MACs for arithmetic circuits on cloud environment
[J]. Journal of Computer Applications, 2018, 38(9): 2543-2548.
|
[7] |
LU Zicong, XU Kaiyong, GUO Song, XIAO Jingxu.
Dynamic measurement of Android kernel based on ARM virtualization extension
[J]. Journal of Computer Applications, 2018, 38(9): 2644-2649.
|
[8] |
BAI Ping, ZHANG Wei, LI Cong, WANG Xu'an.
Verifiable ciphertext retrieval scheme with user revocation
[J]. Journal of Computer Applications, 2018, 38(6): 1640-1643.
|
[9] |
WANG Manman, SHU Yong'an.
Energy consumption of WSN with multi-mobile sinks considering QoS
[J]. Journal of Computer Applications, 2018, 38(3): 758-762.
|
[10] |
XU Mingdi, GAO Yang, GAO Xueyuan, ZHANG Fan.
Correspondence property-based platform configuration attestation
[J]. Journal of Computer Applications, 2018, 38(2): 337-342.
|
[11] |
CAI Mengjuan, CHEN Xingshu, JIN Xin, ZHAO Cheng, YIN Mingyong.
Paging-measurement method for virtual machine process code based on hardware virtualization
[J]. Journal of Computer Applications, 2018, 38(2): 305-309.
|
[12] |
MIAO Junmin, FENG Chaosheng, LI Min, LIU Xia.
Public auditing scheme of data integrity for public cloud
[J]. Journal of Computer Applications, 2018, 38(10): 2892-2898.
|
[13] |
ZHAO Cheng, CHEN Xingshu, JIN Xin.
Virtual machine file integrity monitoring based on hardware virtualization
[J]. Journal of Computer Applications, 2017, 37(2): 388-391.
|
[14] |
ZHANG Xinpeng, XU Chunxiang, ZHANG Xinyan, SAI Wei, HAN Xingyang, LIU Guoping.
Efficient public auditing scheme for cloud storage supporting user revocability with proxy re-signature scheme
[J]. Journal of Computer Applications, 2016, 36(7): 1816-1821.
|
[15] |
LIU Linlin, GUO Chengjun, TIAN Zhong.
Multipath error of deep coupling system based on integrity
[J]. Journal of Computer Applications, 2016, 36(3): 610-615.
|