[1] |
GE Jihong, SHEN Tao.
Energy data access control method based on blockchain
[J]. Journal of Computer Applications, 2021, 41(9): 2615-2622.
|
[2] |
GUAN Qijie, ZHANG Ting, LI Deya, ZHOU Shaojing, DU Yi.
Indefinite reconstruction method of spatial data based on multi-resolution generative adversarial network
[J]. Journal of Computer Applications, 2021, 41(8): 2306-2311.
|
[3] |
GE Lina, HU Yugu, ZHANG Guifen, CHEN Yuanyuan.
Reverse hybrid access control scheme based on object attribute matching in cloud computing environment
[J]. Journal of Computer Applications, 2021, 41(6): 1604-1610.
|
[4] |
DU Xinyu, WANG Huaqun.
Dynamic group based effective identity authentication and key agreement scheme in LTE-A networks
[J]. Journal of Computer Applications, 2021, 41(6): 1715-1722.
|
[5] |
BAO Yulong, ZHU Xueyang, ZHANG Wenhui, SUN Pengfei, ZHAO Yingqi.
Formal verification of smart contract for access control in IoT applications
[J]. Journal of Computer Applications, 2021, 41(4): 930-938.
|
[6] |
WANG Haiyong, PAN Qiqing, GUO Kaixuan.
Access control model based on blockchain and user credit
[J]. Journal of Computer Applications, 2020, 40(6): 1674-1679.
|
[7] |
SHI Jinshan, LI Ru, SONG Tingting.
Blockchain-based access control framework for Internet of things
[J]. Journal of Computer Applications, 2020, 40(4): 931-941.
|
[8] |
MA Dong, CHEN Hongmei, WANG Lizhen, XIAO Qing.
Dominant feature mining of spatial sub-prevalent co-location patterns
[J]. Journal of Computer Applications, 2020, 40(2): 465-472.
|
[9] |
FU Wei, GU Chenyang, GAO Qiang.
Multi-user sharing ORAM scheme based on attribute encryption
[J]. Journal of Computer Applications, 2020, 40(2): 497-502.
|
[10] |
WANG Haiyong, PENG Yao, GUO Kaixuan.
CP-ABE access control scheme based on proxy re-encryption in cloud storage
[J]. Journal of Computer Applications, 2019, 39(9): 2611-2616.
|
[11] |
GAO Shijuan, WANG Xijun, ZHU Qingchao.
Design of optimization algorithm for selfish misbehavior in medium access control protocol of mobile Ad Hoc network
[J]. Journal of Computer Applications, 2019, 39(6): 1786-1791.
|
[12] |
WANG Yaqiong, SHI Guozhen, XIE Rongna, LI Fenghua, WANG Yazhe.
Multi-authority access control scheme with policy hiding of satellite network
[J]. Journal of Computer Applications, 2019, 39(2): 470-475.
|
[13] |
LUO Xiaofeng, YANG Xingchun, HU Yong.
Improved decision diagram for attribute-based access control policy evaluation and management
[J]. Journal of Computer Applications, 2019, 39(12): 3569-3574.
|
[14] |
CAO Zhenhuan, CAI Xiaohai, GU Menghe, GU Xiaozhuo, LI Xiaowei.
Android permission management and control scheme based on access control list mechanism
[J]. Journal of Computer Applications, 2019, 39(11): 3316-3322.
|
[15] |
GAO Shijuan, TAN Tongde, ZHU Qingchao.
Cognitive medium access control protocol optimization design for distributed multi-hop network using single transceiver
[J]. Journal of Computer Applications, 2018, 38(9): 2616-2620.
|