[1] |
GE Jihong, SHEN Tao.
Energy data access control method based on blockchain
[J]. Journal of Computer Applications, 2021, 41(9): 2615-2622.
|
[2] |
MENG Fan, CHEN Guang, WANG Yong, GAO Yang, GAO Dequn, JIA Wenlong.
Multi-granularity temporal structure representation based outlier detection method for prediction of oil reservoir
[J]. Journal of Computer Applications, 2021, 41(8): 2453-2459.
|
[3] |
GE Lina, HU Yugu, ZHANG Guifen, CHEN Yuanyuan.
Reverse hybrid access control scheme based on object attribute matching in cloud computing environment
[J]. Journal of Computer Applications, 2021, 41(6): 1604-1610.
|
[4] |
DU Xinyu, WANG Huaqun.
Dynamic group based effective identity authentication and key agreement scheme in LTE-A networks
[J]. Journal of Computer Applications, 2021, 41(6): 1715-1722.
|
[5] |
BAO Yulong, ZHU Xueyang, ZHANG Wenhui, SUN Pengfei, ZHAO Yingqi.
Formal verification of smart contract for access control in IoT applications
[J]. Journal of Computer Applications, 2021, 41(4): 930-938.
|
[6] |
WANG Peng, LI Yanwen, YANG Di, YANG Huamin.
Macroscopic fundamental diagram traffic signal control model based on hierarchical control
[J]. Journal of Computer Applications, 2021, 41(2): 571-576.
|
[7] |
Junwei REN, Cheng ZENG, Siyu XIAO, Jinxia QIAO, Peng HE.
Session-based recommendation model of multi-granular graph neural network
[J]. Journal of Computer Applications, 2021, 41(11): 3164-3170.
|
[8] |
Li LI, Hongfei YANG, Xiuze DONG.
Hierarchical file access control scheme with identity-based multi-conditional proxy re-encryption
[J]. Journal of Computer Applications, 2021, 41(11): 3251-3256.
|
[9] |
WANG Haiyong, PAN Qiqing, GUO Kaixuan.
Access control model based on blockchain and user credit
[J]. Journal of Computer Applications, 2020, 40(6): 1674-1679.
|
[10] |
SHI Jinshan, LI Ru, SONG Tingting.
Blockchain-based access control framework for Internet of things
[J]. Journal of Computer Applications, 2020, 40(4): 931-941.
|
[11] |
FU Wei, GU Chenyang, GAO Qiang.
Multi-user sharing ORAM scheme based on attribute encryption
[J]. Journal of Computer Applications, 2020, 40(2): 497-502.
|
[12] |
WANG Haiyong, PENG Yao, GUO Kaixuan.
CP-ABE access control scheme based on proxy re-encryption in cloud storage
[J]. Journal of Computer Applications, 2019, 39(9): 2611-2616.
|
[13] |
GAO Shijuan, WANG Xijun, ZHU Qingchao.
Design of optimization algorithm for selfish misbehavior in medium access control protocol of mobile Ad Hoc network
[J]. Journal of Computer Applications, 2019, 39(6): 1786-1791.
|
[14] |
WANG Yaqiong, SHI Guozhen, XIE Rongna, LI Fenghua, WANG Yazhe.
Multi-authority access control scheme with policy hiding of satellite network
[J]. Journal of Computer Applications, 2019, 39(2): 470-475.
|
[15] |
LUO Xiaofeng, YANG Xingchun, HU Yong.
Improved decision diagram for attribute-based access control policy evaluation and management
[J]. Journal of Computer Applications, 2019, 39(12): 3569-3574.
|