[1] |
Haoyu ZHAO, Ziqiang YU, Xiaomeng CHEN, Guoxiang CHEN, Hui ZHU, Bohan LI.
Top-K optimal route query problem with keyword search support
[J]. Journal of Computer Applications, 2024, 44(8): 2455-2465.
|
[2] |
Xiaoling SUN, Danhui WANG, Shanshan LI.
Dynamic ciphertext sorting and retrieval scheme based on blockchain
[J]. Journal of Computer Applications, 2024, 44(8): 2500-2505.
|
[3] |
Gaimei GAO, Jin ZHANG, Chunxia LIU, Weichao DANG, Shangwang BAI.
Privacy protection scheme for crowdsourced testing tasks based on blockchain and CP-ABE policy hiding
[J]. Journal of Computer Applications, 2024, 44(3): 811-818.
|
[4] |
Jing LIANG, Wunan WAN, Shibin ZHANG, Jinquan ZHANG, Zhi QIN.
Traceability storage model of charity system oriented to master-slave chain
[J]. Journal of Computer Applications, 2024, 44(12): 3751-3758.
|
[5] |
Gaimei GAO, Mingbo DUAN, Yaling XUN, Chunxia LIU, Weichao DANG.
SM9-based attribute-based searchable encryption scheme with cryptographic reverse firewall
[J]. Journal of Computer Applications, 2024, 44(11): 3495-3502.
|
[6] |
Haiying MA, Jinzhou LI, Jikun YANG.
Blockchain-based decentralized attribute-based encryption scheme for revocable attributes
[J]. Journal of Computer Applications, 2023, 43(9): 2789-2797.
|
[7] |
Jiaxing LU, Hua DAI, Yuanlong LIU, Qian ZHOU, Geng YANG.
Dictionary partition vector space model for ciphertext ranked search in cloud environment
[J]. Journal of Computer Applications, 2023, 43(7): 1994-2000.
|
[8] |
Wenshuai SONG, Miaolei DENG, Mimi MA, Haochen LI.
Research progress in public-key encryption with keyword search
[J]. Journal of Computer Applications, 2023, 43(3): 794-803.
|
[9] |
Xiaoqiong PANG, Ting YANG, Wenjun CHEN, Yunting WANG, Tianye LIU.
Digital rights management scheme based on secret sharing in blockchain environment
[J]. Journal of Computer Applications, 2021, 41(11): 3257-3265.
|
[10] |
YU Qingfei, TU Guangsheng, LI Ningbo, ZHOU Tanping.
Multi-hop multi-policy attributed-based fully homomorphic encryption scheme
[J]. Journal of Computer Applications, 2019, 39(8): 2326-2332.
|
[11] |
LI Cong, YANG Xiaoyuan, BAI Ping, WANG Xu'an.
Traceable and fully verifiable for outsourced decryption for CP-ABE
[J]. Journal of Computer Applications, 2018, 38(8): 2249-2255.
|
[12] |
LI Cong, YANG Xiaoyuan, WANG Xu'an.
Effecient outsourced computing based on extended attribute-based functional encryption
[J]. Journal of Computer Applications, 2018, 38(6): 1633-1639.
|
[13] |
CUI Weirong, DU Chenglie.
Privacy preserving attribute matching method based on CP-ABE in social networks
[J]. Journal of Computer Applications, 2018, 38(4): 1051-1057.
|
[14] |
ZHANG Guanghua, YANG Yaohong, PANG Shaobo, CHEN Zhenguo.
Adaptive security mechanism for defending On-off attack based on trust in Internet of things
[J]. Journal of Computer Applications, 2018, 38(3): 682-687.
|
[15] |
YANG Hongyu, WANG Yue.
Multi-keyword ciphertext search method in cloud storage environment
[J]. Journal of Computer Applications, 2018, 38(2): 343-347.
|