[1] |
Haifeng MA, Jiewei CAI, Qingshui XUE, Jiahai YANG, Jing HAN, Zixuan LU.
Post-quantum certificateless public audit scheme based on lattice
[J]. Journal of Computer Applications, 2025, 45(4): 1249-1255.
|
[2] |
Xiaojun ZHANG, Yunpu HAO, Lei LI, Chenyang LI, Ziyu ZHOU.
Data tamper-proof batch auditing scheme based on industrial cloud storage systems
[J]. Journal of Computer Applications, 2025, 45(3): 891-895.
|
[3] |
Xiaoling SUN, Danhui WANG, Shanshan LI.
Dynamic ciphertext sorting and retrieval scheme based on blockchain
[J]. Journal of Computer Applications, 2024, 44(8): 2500-2505.
|
[4] |
Zheng WANG, Jingwei WANG, Xinchun YIN.
Searchable electronic health record sharing scheme with user revocation
[J]. Journal of Computer Applications, 2024, 44(2): 504-511.
|
[5] |
Gaimei GAO, Mingbo DUAN, Yaling XUN, Chunxia LIU, Weichao DANG.
SM9-based attribute-based searchable encryption scheme with cryptographic reverse firewall
[J]. Journal of Computer Applications, 2024, 44(11): 3495-3502.
|
[6] |
Xiaoyu DU, Shuaiqi LIU, Zhijie HAN, Zhenxiang HUO, Yujing WANG.
Patient-centric medical information sharing scheme based on IPFS and blockchain
[J]. Journal of Computer Applications, 2024, 44(10): 3122-3133.
|
[7] |
Jiaxing LU, Hua DAI, Yuanlong LIU, Qian ZHOU, Geng YANG.
Dictionary partition vector space model for ciphertext ranked search in cloud environment
[J]. Journal of Computer Applications, 2023, 43(7): 1994-2000.
|
[8] |
Zhenjie XIE, Wei FU.
Error replica recovery mechanism for cloud storage based on auditable multiple replicas
[J]. Journal of Computer Applications, 2023, 43(4): 1102-1108.
|
[9] |
PANG Xiaoqiong, WANG Yunting, CHEN Wenjun, JIANG Pan, GAO Yanan.
Fair and verifiable multi-keyword ranked search over encrypted data based on blockchain
[J]. Journal of Computer Applications, 2023, 43(1): 130-139.
|
[10] |
Li LI, Yi WU, Zhikun YANG, Yunpeng CHEN.
Medical electronic record sharing scheme based on sharding-based blockchain
[J]. Journal of Computer Applications, 2022, 42(1): 183-190.
|
[11] |
LI Xiuyan, LIU Mingxi, SHI Wenbo, DONG Guofang.
Efficient dynamic data audit scheme for resource-constrained users
[J]. Journal of Computer Applications, 2021, 41(2): 422-432.
|
[12] |
Xiaoling SUN, Guang YANG, Yanping SHEN, Qiuge YANG, Tao CHEN.
Searchable encryption scheme based on splittable inverted index
[J]. Journal of Computer Applications, 2021, 41(11): 3288-3294.
|
[13] |
TANG Xin, ZHOU Linna.
Response obfuscation based secure deduplication method for cloud data with resistance against appending chunk attack
[J]. Journal of Computer Applications, 2020, 40(4): 1085-1090.
|
[14] |
Wei FU, Chenyang GU, Qiang GAO.
Multi-user sharing ORAM scheme based on attribute encryption
[J]. Journal of Computer Applications, 2020, 40(2): 497-502.
|
[15] |
ZHANG En, HOU Yingying, LI Gongli, LI Huimin, LI Yu.
Adaptive hierarchical searchable encryption scheme based on learning with errors
[J]. Journal of Computer Applications, 2020, 40(1): 148-156.
|