[1] |
GE Jihong, SHEN Tao.
Energy data access control method based on blockchain
[J]. Journal of Computer Applications, 2021, 41(9): 2615-2622.
|
[2] |
MA Hua, CHEN Yuepeng, TANG Wensheng, LOU Xiaoping, HUANG Zhuoxuan.
Survey of research progress on crowdsourcing task assignment for evaluation of workers’ ability
[J]. Journal of Computer Applications, 2021, 41(8): 2232-2241.
|
[3] |
DU Xinyu, WANG Huaqun.
Dynamic group based effective identity authentication and key agreement scheme in LTE-A networks
[J]. Journal of Computer Applications, 2021, 41(6): 1715-1722.
|
[4] |
GE Lina, HU Yugu, ZHANG Guifen, CHEN Yuanyuan.
Reverse hybrid access control scheme based on object attribute matching in cloud computing environment
[J]. Journal of Computer Applications, 2021, 41(6): 1604-1610.
|
[5] |
BAO Yulong, ZHU Xueyang, ZHANG Wenhui, SUN Pengfei, ZHAO Yingqi.
Formal verification of smart contract for access control in IoT applications
[J]. Journal of Computer Applications, 2021, 41(4): 930-938.
|
[6] |
Li LI, Hongfei YANG, Xiuze DONG.
Hierarchical file access control scheme with identity-based multi-conditional proxy re-encryption
[J]. Journal of Computer Applications, 2021, 41(11): 3251-3256.
|
[7] |
WANG Haiyong, PAN Qiqing, GUO Kaixuan.
Access control model based on blockchain and user credit
[J]. Journal of Computer Applications, 2020, 40(6): 1674-1679.
|
[8] |
SHI Jinshan, LI Ru, SONG Tingting.
Blockchain-based access control framework for Internet of things
[J]. Journal of Computer Applications, 2020, 40(4): 931-941.
|
[9] |
Wei FU, Chenyang GU, Qiang GAO.
Multi-user sharing ORAM scheme based on attribute encryption
[J]. Journal of Computer Applications, 2020, 40(2): 497-502.
|
[10] |
WANG Haiyong, PENG Yao, GUO Kaixuan.
CP-ABE access control scheme based on proxy re-encryption in cloud storage
[J]. Journal of Computer Applications, 2019, 39(9): 2611-2616.
|
[11] |
XIAO Kai, WANG Meng, TANG Xinyu, JIANG Tonghai.
Public welfare time bank system based on blockchain technology
[J]. Journal of Computer Applications, 2019, 39(7): 2156-2161.
|
[12] |
GAO Shijuan, WANG Xijun, ZHU Qingchao.
Design of optimization algorithm for selfish misbehavior in medium access control protocol of mobile Ad Hoc network
[J]. Journal of Computer Applications, 2019, 39(6): 1786-1791.
|
[13] |
WANG Yaqiong, SHI Guozhen, XIE Rongna, LI Fenghua, WANG Yazhe.
Multi-authority access control scheme with policy hiding of satellite network
[J]. Journal of Computer Applications, 2019, 39(2): 470-475.
|
[14] |
LUO Xiaofeng, YANG Xingchun, HU Yong.
Improved decision diagram for attribute-based access control policy evaluation and management
[J]. Journal of Computer Applications, 2019, 39(12): 3569-3574.
|
[15] |
CAO Zhenhuan, CAI Xiaohai, GU Menghe, GU Xiaozhuo, LI Xiaowei.
Android permission management and control scheme based on access control list mechanism
[J]. Journal of Computer Applications, 2019, 39(11): 3316-3322.
|