[1] |
Binhan LI, Lunzhi DENG, Huan LIU.
Cloud-based conditional broadcast proxy re-encryption scheme
[J]. Journal of Computer Applications, 2025, 45(7): 2278-2287.
|
[2] |
Jintao RAO, Zhe CUI.
Electronic voting scheme based on SM2 threshold blind signature
[J]. Journal of Computer Applications, 2024, 44(2): 512-518.
|
[3] |
Yiting WANG, Wunan WAN, Shibin ZHANG, Jinquan ZHANG, Zhi QIN.
Linkable ring signature scheme based on SM9 algorithm
[J]. Journal of Computer Applications, 2024, 44(12): 3709-3716.
|
[4] |
Ran ZHAI, Xuebin CHEN, Guopeng ZHANG, Langtao PEI, Zheng MA.
Improved K-anonymity privacy protection algorithm based on different sensitivities
[J]. Journal of Computer Applications, 2023, 43(5): 1497-1503.
|
[5] |
Xiuping ZHU, Yali LIU, Changlu LIN, Tao LI, Yongquan DONG.
Efficient certificateless ring signature scheme based on elliptic curve
[J]. Journal of Computer Applications, 2023, 43(11): 3368-3374.
|
[6] |
ZHAO Hong, YU Shuhan, HAN Yanyan, LI Zhaobin.
Analysis and improvement of certificateless signature scheme
[J]. Journal of Computer Applications, 2023, 43(1): 147-153.
|
[7] |
Suqing LIN, Shuhua ZHANG.
Attribute-based encryption scheme with verifiable search and non-monotonic access structure
[J]. Journal of Computer Applications, 2022, 42(9): 2772-2779.
|
[8] |
Dong ZHU, Xinchun YIN, Jianting NING.
Certificateless signature scheme with strong privacy protection for internet of vehicles
[J]. Journal of Computer Applications, 2022, 42(10): 3091-3101.
|
[9] |
Dingkang LIN, Jiaqi YAN, Nandeng BA, Zhenhao FU, Haochen JIANG.
Survey of anonymity and tracking technology in Monero
[J]. Journal of Computer Applications, 2022, 42(1): 148-156.
|
[10] |
WU Kaifan, YIN Xinchun.
Lightweight anonymous mutual authentication protocol based on random operators for radio frequency identification system
[J]. Journal of Computer Applications, 2021, 41(6): 1621-1630.
|
[11] |
LIU Xiangyu, XIA Guoping, XIA Xiufeng, ZONG Chuanyu, ZHU Rui, LI Jiajia.
Personalized privacy protection for spatio-temporal data
[J]. Journal of Computer Applications, 2021, 41(3): 643-650.
|
[12] |
Liu YANG, Yun LI.
Hybrid K-anonymous feature selection algorithm
[J]. Journal of Computer Applications, 2021, 41(12): 3521-3526.
|
[13] |
Li LI, Hongfei YANG, Xiuze DONG.
Hierarchical file access control scheme with identity-based multi-conditional proxy re-encryption
[J]. Journal of Computer Applications, 2021, 41(11): 3251-3256.
|
[14] |
Meishu ZHANG, Yabin XU.
Personalized privacy protection method for data with multiple numerical sensitive attributes
[J]. Journal of Computer Applications, 2020, 40(2): 491-496.
|
[15] |
ZUO Liming, HU Kaiyu, ZHANG Mengli, CHEN Lanlan.
Data transmission protocol based on short signature scheme for railway bridge monitoring
[J]. Journal of Computer Applications, 2018, 38(8): 2261-2266.
|