[1] |
Chaoying YAN, Ziyi ZHANG, Yingnan QU, Qiuyu LI, Dixiang ZHENG, Lijun SUN.
Double auction carbon trading based on consortium blockchain
[J]. Journal of Computer Applications, 2024, 44(10): 3240-3245.
|
[2] |
Peiyao ZHANG, Xiaodong FU.
Incentive mechanism of crowdsourcing multi-task assignment against malicious bidding
[J]. Journal of Computer Applications, 2024, 44(1): 261-268.
|
[3] |
Jingyi WANG, Chao LI, Heng SONG, Di LI, Junwu ZHU.
Spectrum combinatorial auction mechanism based on random walk algorithm
[J]. Journal of Computer Applications, 2023, 43(8): 2352-2357.
|
[4] |
Jiaxing LU, Hua DAI, Yuanlong LIU, Qian ZHOU, Geng YANG.
Dictionary partition vector space model for ciphertext ranked search in cloud environment
[J]. Journal of Computer Applications, 2023, 43(7): 1994-2000.
|
[5] |
Yanan PAN, Qingxian PAN, Zhaoyi YU, Jiajing CHU, Song YU.
Online incentive mechanism based on quality perception in spatio-temporal crowdsourcing
[J]. Journal of Computer Applications, 2023, 43(7): 2091-2099.
|
[6] |
Jingyu SUN, Jiayu ZHU, Ziqiang TIAN, Guozhen SHI, Chuanjiang GUAN.
Attribute based encryption scheme based on elliptic curve cryptography and supporting revocation
[J]. Journal of Computer Applications, 2022, 42(7): 2094-2103.
|
[7] |
Jinquan ZHANG, Shouwei XU, Xincheng LI, Chongyang WANG, Jingzhi XU.
Cloud computing task scheduling based on orthogonal adaptive whale optimization
[J]. Journal of Computer Applications, 2022, 42(5): 1516-1523.
|
[8] |
CHEN Jiahao, YIN Xinchun.
Traceable and revocable ciphertext-policy attribute-based encryption scheme based on cloud-fog computing
[J]. Journal of Computer Applications, 2021, 41(6): 1611-1620.
|
[9] |
GE Lina, HU Yugu, ZHANG Guifen, CHEN Yuanyuan.
Reverse hybrid access control scheme based on object attribute matching in cloud computing environment
[J]. Journal of Computer Applications, 2021, 41(6): 1604-1610.
|
[10] |
LI Bei, ZHANG Wenyin, WANG Jiuru, ZHAO Wei, WANG Haifeng.
Sealed-bid auction scheme based on blockchain
[J]. Journal of Computer Applications, 2021, 41(4): 999-1004.
|
[11] |
YANG Ling, JIANG Chunmao.
Strategy of energy-aware virtual machine migration based on three-way decision
[J]. Journal of Computer Applications, 2021, 41(4): 990-998.
|
[12] |
ZHU Yongjin, YIN Fei, DOU Longlong, WU Kun, ZHANG Zhiwei, QIAN Zhuzhong.
Adaptive network transmission mechanism based on forward error correction
[J]. Journal of Computer Applications, 2021, 41(3): 825-832.
|
[13] |
Xiaoling SUN, Guang YANG, Yanping SHEN, Qiuge YANG, Tao CHEN.
Searchable encryption scheme based on splittable inverted index
[J]. Journal of Computer Applications, 2021, 41(11): 3288-3294.
|
[14] |
LYU Jiayu, ZHU Zhirong, YAO Zhiqiang.
Two-channel dynamic data encryption strategy in cloud computing environment
[J]. Journal of Computer Applications, 2020, 40(8): 2268-2273.
|
[15] |
GUO Shujie, LI Zhihua, LIN Kaiqing.
Fuzzy membership degree based virtual machine placement algorithmin cloud environment
[J]. Journal of Computer Applications, 2020, 40(5): 1374-1381.
|