| [1] | Dayan ZHAO, Huajun HE, Yuping LI, Junbo ZHANG, Tianrui LI, Yu ZHENG. 
														
															Access control model for government collaboration
														[J]. Journal of Computer Applications, 2025, 45(1): 162-169. | 
																																																																																
													| [2] | Sunjie YU, Hui ZENG, Shiyu XIONG, Hongzhou SHI. 
														
															Incentive mechanism for federated learning based on generative adversarial network
														[J]. Journal of Computer Applications, 2024, 44(2): 344-352. | 
																																																																																
													| [3] | Huan ZHANG, Jingyu WANG, Lixin LIU, Xiaoyu JIANG. 
														
															Multi-organization collaborative data sharing scheme with dual authorization
														[J]. Journal of Computer Applications, 2024, 44(10): 3307-3314. | 
																																																																																
													| [4] | Jing ZHANG, He TIAN, Kun XIONG, Yongli TANG, Li YANG. 
														
															Fair multi-party private set intersection protocol based on cloud server
														[J]. Journal of Computer Applications, 2023, 43(9): 2806-2811. | 
																																																																																
													| [5] | Meng CAO, Sunjie YU, Hui ZENG, Hongzhou SHI. 
														
															Hierarchical access control and sharing system of medical data based on blockchain
														[J]. Journal of Computer Applications, 2023, 43(5): 1518-1526. | 
																																																																																
													| [6] | Chao LIN, Debiao HE, Xinyi HUANG. 
														
															Blockchain‑based electronic medical record secure sharing
														[J]. Journal of Computer Applications, 2022, 42(11): 3465-3472. | 
																																																																																
													| [7] | Li LI, Yi WU, Zhikun YANG, Yunpeng CHEN. 
														
															Medical electronic record sharing scheme based on sharding-based blockchain
														[J]. Journal of Computer Applications, 2022, 42(1): 183-190. | 
																																																																																
													| [8] | GE Lina, HU Yugu, ZHANG Guifen, CHEN Yuanyuan. 
														
															Reverse hybrid access control scheme based on object attribute matching in cloud computing environment
														[J]. Journal of Computer Applications, 2021, 41(6): 1604-1610. | 
																																																																																
													| [9] | ZHANG Lihua, WANG Xinyi, HU Fangzhou, HUANG Yang, BAI Jiayi. 
														
															Data sharing model of smart grid based on double consortium blockchains
														[J]. Journal of Computer Applications, 2021, 41(4): 963-969. | 
																																																																																
													| [10] | LUO Wenjun, WEN Shenglian, CHENG Yu. 
														
															Blockchain-based electronic health record sharing scheme
														[J]. Journal of Computer Applications, 2020, 40(1): 157-161. | 
																																																																																
													| [11] | SONG Jundian, DAI Bingrong, JIANG Liwen, ZHAO Yao, LI Chao, WANG Xiaoqiang. 
														
															Data governance collaborative method based on blockchain
														[J]. Journal of Computer Applications, 2018, 38(9): 2500-2506. | 
																																																																																
													| [12] | ZHANG En, JIN Ganggang. 
														
															Cloud outsourcing multiparty private set intersection protocol based on homomorphic encryption and Bloom filter
														[J]. Journal of Computer Applications, 2018, 38(8): 2256-2260. | 
																																																																																
													| [13] | LUO Xiaoshuang, YANG Xiaoyuan, WANG Xu'an. 
														
															A private set intersection protocol against malicious attack
														[J]. Journal of Computer Applications, 2017, 37(6): 1593-1598. | 
																																																																																
													| [14] | CUI Weirong, DU Chenglie. 
														
															Fast proximity testing method with privacy preserving in mobile social network
														[J]. Journal of Computer Applications, 2017, 37(6): 1657-1662. | 
																																																																																
													| [15] | HAO Wei, YANG Xiaoyuan, WANG Xu'an, ZHANG Yingnan, WU Liqiang. 
														
															Asymmetric proxy re-encryption scheme of efficient access to outsourcing data for mobile users
														[J]. Journal of Computer Applications, 2016, 36(8): 2225-2230. |