[1] |
Ziqian CHEN, Kedi NIU, Zhongyuan YAO, Xueming SI.
Review of blockchain lightweight technology applied to internet of things
[J]. Journal of Computer Applications, 2024, 44(12): 3688-3698.
|
[2] |
Kedi NIU, Min LI, Zhongyuan YAO, Xueming SI.
Review of blockchain consensus algorithms for internet of things
[J]. Journal of Computer Applications, 2024, 44(12): 3678-3687.
|
[3] |
Yicheng WAN, Guangxiang YANG, Qingda ZHANG, Chenyang GAN, Lin YI.
Impact of non-persistent carrier sense multiple access mechanism on scalability of LoRa networks
[J]. Journal of Computer Applications, 2023, 43(9): 2885-2896.
|
[4] |
Xu WANG, Yumin SHEN, Xiaoyun XIONG, Peng LI, Jinlong WANG.
Data management method for building internet of things based on Hashgraph
[J]. Journal of Computer Applications, 2022, 42(8): 2471-2480.
|
[5] |
Hongqiu LUO, Shengbo HU.
Data naming mechanism of low earth orbit satellite mega-constellation for internet of things
[J]. Journal of Computer Applications, 2022, 42(7): 2146-2154.
|
[6] |
Jie ZHANG, Shanshan XU, Lingyun YUAN.
Internet of things access control model based on blockchain and edge computing
[J]. Journal of Computer Applications, 2022, 42(7): 2104-2111.
|
[7] |
Ning DONG, Xiaorong CHENG, Mingquan ZHANG.
Intrusion detection system with dynamic weight loss function based on internet of things platform
[J]. Journal of Computer Applications, 2022, 42(7): 2118-2124.
|
[8] |
TIAN Zhihong, ZHAO Jindong.
Overview of blockchain consensus mechanism for internet of things
[J]. Journal of Computer Applications, 2021, 41(4): 917-929.
|
[9] |
BAO Yulong, ZHU Xueyang, ZHANG Wenhui, SUN Pengfei, ZHAO Yingqi.
Formal verification of smart contract for access control in IoT applications
[J]. Journal of Computer Applications, 2021, 41(4): 930-938.
|
[10] |
ZHANG Lingzhe, HUANG Xiangdong, QIAO Jialin, GOU Wangminhao, WANG Jianmin.
Two-stage file compaction framework by log-structured merge-tree for time series data
[J]. Journal of Computer Applications, 2021, 41(3): 618-622.
|
[11] |
LI Xiuyan, LIU Mingxi, SHI Wenbo, DONG Guofang.
Efficient dynamic data audit scheme for resource-constrained users
[J]. Journal of Computer Applications, 2021, 41(2): 422-432.
|
[12] |
CHENG Xiaohui, NIU Tong, WANG Yanjun.
Wireless sensor network intrusion detection system based on sequence model
[J]. Journal of Computer Applications, 2020, 40(6): 1680-1684.
|
[13] |
SHI Jinshan, LI Ru, SONG Tingting.
Blockchain-based access control framework for Internet of things
[J]. Journal of Computer Applications, 2020, 40(4): 931-941.
|
[14] |
Shuman WANG, Aiping LI, Liguo DUAN, Jia FU, Yongle CHEN.
Service discovery method for Internet of Things based on Biterm topic model
[J]. Journal of Computer Applications, 2020, 40(2): 459-464.
|
[15] |
ZHOU Zhen, YUAN Zhengdao.
Efficient communication receiver design for Internet of things environment
[J]. Journal of Computer Applications, 2020, 40(1): 202-206.
|