[1] |
Xiuping ZHU, Yali LIU, Changlu LIN, Tao LI, Yongquan DONG.
Efficient certificateless ring signature scheme based on elliptic curve
[J]. Journal of Computer Applications, 2023, 43(11): 3368-3374.
|
[2] |
Jingyu SUN, Jiayu ZHU, Ziqiang TIAN, Guozhen SHI, Chuanjiang GUAN.
Attribute based encryption scheme based on elliptic curve cryptography and supporting revocation
[J]. Journal of Computer Applications, 2022, 42(7): 2094-2103.
|
[3] |
Chunming TANG, Yuqing CHEN, Zidi ZHANG.
Improved consensus algorithm based on binomial swap forest and HotStuff
[J]. Journal of Computer Applications, 2022, 42(7): 2112-2117.
|
[4] |
Wenyong YUAN, Xiuguang LI, Ruifeng LI, Zhengge YI, Xiaoyuan YANG.
Trusted integrity verification scheme of cloud data without bilinear pairings
[J]. Journal of Computer Applications, 2022, 42(12): 3769-3774.
|
[5] |
LI Jing, JING Xu, YANG Huijun.
Blockchain electronic counting scheme based on practical Byzantine fault tolerance algorithm
[J]. Journal of Computer Applications, 2020, 40(4): 954-960.
|
[6] |
CHENG Yage, JIA Zhijuan, HU Mingsheng, GONG Bei, WANG Lipeng.
Threshold signature scheme suitable for blockchain electronic voting scenes
[J]. Journal of Computer Applications, 2019, 39(9): 2629-2635.
|
[7] |
CHEN Hong, LIU Yumeng, XIAO Chenglong, GUO Pengfei, XIAO Zhenjiu.
Improved RC4 algorithm based on elliptic curve
[J]. Journal of Computer Applications, 2019, 39(8): 2339-2345.
|
[8] |
LIU Xindong, XU Shuishuai, CHEN Jianhua.
Authentication scheme for smart grid communication based on elliptic curve cryptography
[J]. Journal of Computer Applications, 2019, 39(3): 779-783.
|
[9] |
WANG Yan, HOU Zhengfeng, ZHANG Xueqi, HUANG Mengjie.
Dynamic threshold signature scheme based on Chinese remainder theorem
[J]. Journal of Computer Applications, 2018, 38(4): 1041-1045.
|
[10] |
XU Hailin, LU Yang.
Efficient bilinear-pairing-free certificate-based encryption scheme with keyword search
[J]. Journal of Computer Applications, 2018, 38(2): 379-385.
|
[11] |
YANG Xingchun, XU Chunxiang, LI Chaorong.
ECC-based RFID authentication protocol enabling tag ownership transfer
[J]. Journal of Computer Applications, 2017, 37(8): 2275-2280.
|
[12] |
JIANG Tiejin, REN Yanli.
Secure outsourcing algorithm of bilinear pairings with single server
[J]. Journal of Computer Applications, 2016, 36(7): 1866-1869.
|
[13] |
LI Yun, CHEN Pangsen, SUN Shanlin.
Security analysis and implementation for wireless local area network access protocol via near field communication authentication
[J]. Journal of Computer Applications, 2016, 36(5): 1236-1245.
|
[14] |
XU Hailin, CHEN Ying, LU Yang.
Efficient certificate-based proxy re-encryption scheme without bilinear pairings
[J]. Journal of Computer Applications, 2016, 36(5): 1250-1256.
|
[15] |
XU Shengwei, CHEN Cheng, WANG Rongrong.
Improved differential fault attack on scalar multiplication algorithm in elliptic curve cryptosystem
[J]. Journal of Computer Applications, 2016, 36(12): 3328-3332.
|