[1] |
Zheng WANG, Jingwei WANG, Xinchun YIN.
Searchable electronic health record sharing scheme with user revocation
[J]. Journal of Computer Applications, 2024, 44(2): 504-511.
|
[2] |
Zhenhao ZHAO, Shibin ZHANG, Wunan WAN, Jinquan ZHANG, zhi QIN.
Delegated proof of stake consensus algorithm based on reputation value and strong blind signature algorithm
[J]. Journal of Computer Applications, 2024, 44(12): 3717-3722.
|
[3] |
Ziqian CHEN, Kedi NIU, Zhongyuan YAO, Xueming SI.
Review of blockchain lightweight technology applied to internet of things
[J]. Journal of Computer Applications, 2024, 44(12): 3688-3698.
|
[4] |
Shumin TANG, Yu JIN.
Consensus mechanism of voting scheme in blockchain based on Chinese remainder theorem
[J]. Journal of Computer Applications, 2023, 43(2): 458-466.
|
[5] |
Chundong WANG, Xin JIANG.
Improved practical Byzantine fault tolerance algorithm based on verifiable delay function
[J]. Journal of Computer Applications, 2023, 43(11): 3484-3489.
|
[6] |
Chao LIN, Debiao HE, Xinyi HUANG.
Blockchain‑based electronic medical record secure sharing
[J]. Journal of Computer Applications, 2022, 42(11): 3465-3472.
|
[7] |
Hexiong CHEN, Yuwei LUO, Yunkai WEI, Wei GUO, Feilu HANG, Zhengxiong MAO, Zhenhong ZHANG, Yingjun HE, Zhenyu LUO, Linjiang XIE, Ning YANG.
Blockchain-based data frame security verification mechanism in software defined network
[J]. Journal of Computer Applications, 2022, 42(10): 3074-3083.
|
[8] |
QING Xinyi, CHEN Yuling, ZHOU Zhengqiang, TU Yuanchao, LI Tao.
Blockchain storage expansion model based on Chinese remainder theorem
[J]. Journal of Computer Applications, 2021, 41(7): 1977-1982.
|
[9] |
YANG Longhai, WANG Xueyuan, JIANG Hesong.
Blockchain digital signature scheme with improved SM2 signature method
[J]. Journal of Computer Applications, 2021, 41(7): 1983-1988.
|
[10] |
GU Zhengchuan, GUO Yuanbo, FANG Chen.
End-to-end security solution for message queue telemetry transport protocol based on proxy re-encryption
[J]. Journal of Computer Applications, 2021, 41(5): 1378-1385.
|
[11] |
CHENG Yage, JIA Zhijuan, HU Mingsheng, GONG Bei, WANG Lipeng.
Threshold signature scheme suitable for blockchain electronic voting scenes
[J]. Journal of Computer Applications, 2019, 39(9): 2629-2635.
|
[12] |
CHEN Hong, LIU Yumeng, XIAO Chenglong, GUO Pengfei, XIAO Zhenjiu.
Improved RC4 algorithm based on elliptic curve
[J]. Journal of Computer Applications, 2019, 39(8): 2339-2345.
|
[13] |
SHI Zhicai, WANG Yihan, ZHANG Xiaomei, CHEN Shanshan, CHEN Jiwei.
Provable radio frequency identification authentication protocol with scalability
[J]. Journal of Computer Applications, 2019, 39(3): 774-778.
|
[14] |
QIN Pingle, LI Qi, ZENG Jianchao, ZHANG Na, SONG Yulong.
Image retrieval algorithm for pulmonary nodules based on multi-scale dense network
[J]. Journal of Computer Applications, 2019, 39(2): 392-397.
|
[15] |
WANG Yan, HOU Zhengfeng, ZHANG Xueqi, HUANG Mengjie.
Dynamic threshold signature scheme based on Chinese remainder theorem
[J]. Journal of Computer Applications, 2018, 38(4): 1041-1045.
|