[1] |
Yuxuan CHEN, Haibin ZHENG, Zhenyu GUAN, Boheng SU, Yujue WANG, Zhenwei GUO.
Blockchain sharding mechanism in asynchronous network based on HoneyBadgerBFT and DAG
[J]. Journal of Computer Applications, 2025, 45(7): 2092-2100.
|
[2] |
Li’e WANG, Caiyi LIN, Yongdong LI, Xingcheng FU, Xianxian LI.
Digital content copyright protection and fair tracking scheme based on blockchain
[J]. Journal of Computer Applications, 2025, 45(6): 1756-1765.
|
[3] |
Yueduan XU, Jianwei CHEN, Hengliang ZHU.
Conditional privacy-preserving authentication scheme based on certificateless group signature for VANET
[J]. Journal of Computer Applications, 2025, 45(5): 1556-1563.
|
[4] |
Gaimei GAO, Miaolian DU, Chunxia LIU, Yuli YANG, Weichao DANG, Guoxia DI.
Privacy protection method for consortium blockchain based on SM2 linkable ring signature
[J]. Journal of Computer Applications, 2025, 45(5): 1564-1572.
|
[5] |
Xiaojun ZHANG, Yunpu HAO, Lei LI, Chenyang LI, Ziyu ZHOU.
Data tamper-proof batch auditing scheme based on industrial cloud storage systems
[J]. Journal of Computer Applications, 2025, 45(3): 891-895.
|
[6] |
Chunxia LIU, Hanying XU, Gaimei GAO, Weichao DANG, Zilu LI.
Smart contract vulnerability detection method based on echo state network
[J]. Journal of Computer Applications, 2025, 45(1): 153-161.
|
[7] |
Min SUN, Shihang JIAO, Chenyan WANG.
Credit based committee consensus mechanism
[J]. Journal of Computer Applications, 2025, 45(1): 170-177.
|
[8] |
Tingwei CHEN, Jiacheng ZHANG, Junlu WANG.
Random validation blockchain construction for federated learning
[J]. Journal of Computer Applications, 2024, 44(9): 2770-2776.
|
[9] |
Xiaoling SUN, Danhui WANG, Shanshan LI.
Dynamic ciphertext sorting and retrieval scheme based on blockchain
[J]. Journal of Computer Applications, 2024, 44(8): 2500-2505.
|
[10] |
He HUANG, Yu JIN.
Cloud data auditing scheme based on voting and Ethereum smart contracts
[J]. Journal of Computer Applications, 2024, 44(7): 2093-2101.
|
[11] |
Jiao LI, Xiushan ZHANG, Yuanhang NING.
Blockchain sharding method for reducing cross-shard transaction proportion
[J]. Journal of Computer Applications, 2024, 44(6): 1889-1896.
|
[12] |
Lipeng ZHAO, Bing GUO.
Blockchain consensus improvement algorithm based on BDLS
[J]. Journal of Computer Applications, 2024, 44(4): 1139-1147.
|
[13] |
Meihong CHEN, Lingyun YUAN, Tong XIA.
Data classified and graded access control model based on master-slave multi-chain
[J]. Journal of Computer Applications, 2024, 44(4): 1148-1157.
|
[14] |
Gaimei GAO, Jin ZHANG, Chunxia LIU, Weichao DANG, Shangwang BAI.
Privacy protection scheme for crowdsourced testing tasks based on blockchain and CP-ABE policy hiding
[J]. Journal of Computer Applications, 2024, 44(3): 811-818.
|
[15] |
Haifeng MA, Yuxia LI, Qingshui XUE, Jiahai YANG, Yongfu GAO.
Attribute-based encryption scheme for blockchain privacy protection
[J]. Journal of Computer Applications, 2024, 44(2): 485-489.
|