[1] |
Zhenhao ZHAO, Shibin ZHANG, Wunan WAN, Jinquan ZHANG, zhi QIN.
Delegated proof of stake consensus algorithm based on reputation value and strong blind signature algorithm
[J]. Journal of Computer Applications, 2024, 44(12): 3717-3722.
|
[2] |
Chao LIN, Debiao HE, Xinyi HUANG.
Blockchain‑based electronic medical record secure sharing
[J]. Journal of Computer Applications, 2022, 42(11): 3465-3472.
|
[3] |
Hexiong CHEN, Yuwei LUO, Yunkai WEI, Wei GUO, Feilu HANG, Zhengxiong MAO, Zhenhong ZHANG, Yingjun HE, Zhenyu LUO, Linjiang XIE, Ning YANG.
Blockchain-based data frame security verification mechanism in software defined network
[J]. Journal of Computer Applications, 2022, 42(10): 3074-3083.
|
[4] |
YANG Longhai, WANG Xueyuan, JIANG Hesong.
Blockchain digital signature scheme with improved SM2 signature method
[J]. Journal of Computer Applications, 2021, 41(7): 1983-1988.
|
[5] |
GU Zhengchuan, GUO Yuanbo, FANG Chen.
End-to-end security solution for message queue telemetry transport protocol based on proxy re-encryption
[J]. Journal of Computer Applications, 2021, 41(5): 1378-1385.
|
[6] |
ZHOU Zhicheng, LI Lixin, LI Zuohui.
Efficient cross-domain authentication scheme based on blockchain technology
[J]. Journal of Computer Applications, 2018, 38(2): 316-320.
|
[7] |
LU Jintian, YAO Lili, HE Xudong, MENG Bo.
Improvement of OpenID Connect protocol and its security analysis
[J]. Journal of Computer Applications, 2017, 37(5): 1347-1352.
|
[8] |
ZENG Xiaofei, LU Jianzhu, WANG Jie.
Broadcast authentication using cooperative sensor nodes
[J]. Journal of Computer Applications, 2016, 36(8): 2219-2224.
|
[9] |
LI Yun, CHEN Pangsen, SUN Shanlin.
Security analysis and implementation for wireless local area network access protocol via near field communication authentication
[J]. Journal of Computer Applications, 2016, 36(5): 1236-1245.
|
[10] |
REN Xiaokang, CHEN Peilin, CAO Yuan, LI Yanan, YANG Xiaodong.
Partially blind signature scheme with ID-based server-aided verification
[J]. Journal of Computer Applications, 2016, 36(11): 3098-3102.
|
[11] |
HUANG Ping, YANG Xiaodong, LI Yan, WANG Caifen.
Identity-based proxy re-signature scheme without bilinear pairing
[J]. Journal of Computer Applications, 2015, 35(6): 1678-1682.
|
[12] |
ZUO Liming, CHEN Renqun, GUO Hongli.
Provable identity-based signcryption scheme
[J]. Journal of Computer Applications, 2015, 35(3): 712-716.
|
[13] |
DU Guiying, HUANG Zhenjie.
Efficient certificate-based verifiably encrypted signature scheme
[J]. Journal of Computer Applications, 2015, 35(2): 407-411.
|
[14] |
WANG Qian, ZHENG Dong, REN Fang.
Code-based blind signature scheme
[J]. Journal of Computer Applications, 2015, 35(10): 2867-2871.
|
[15] |
YE Xiang XU Zhan HU Xiang LIU Dan.
Low-cost mutual authenticate and encrypt scheme for active RIFD system
[J]. Journal of Computer Applications, 2014, 34(2): 456-460.
|