[1] |
Baoyan SONG, Junxiang DING, Junlu WANG, Haolin ZHANG.
Consortium blockchain modification method based on chameleon hash and verifiable secret sharing
[J]. Journal of Computer Applications, 2024, 44(7): 2087-2092.
|
[2] |
Zheng WANG, Jingwei WANG, Xinchun YIN.
Searchable electronic health record sharing scheme with user revocation
[J]. Journal of Computer Applications, 2024, 44(2): 504-511.
|
[3] |
Ziqian CHEN, Kedi NIU, Zhongyuan YAO, Xueming SI.
Review of blockchain lightweight technology applied to internet of things
[J]. Journal of Computer Applications, 2024, 44(12): 3688-3698.
|
[4] |
Chundong WANG, Xin JIANG.
Improved practical Byzantine fault tolerance algorithm based on verifiable delay function
[J]. Journal of Computer Applications, 2023, 43(11): 3484-3489.
|
[5] |
Na ZHOU, Ming CHENG, Menglin JIA, Yang YANG.
Medical image privacy protection based on thumbnail encryption and distributed storage
[J]. Journal of Computer Applications, 2023, 43(10): 3149-3155.
|
[6] |
Xiaoqiong PANG, Ting YANG, Wenjun CHEN, Yunting WANG, Tianye LIU.
Digital rights management scheme based on secret sharing in blockchain environment
[J]. Journal of Computer Applications, 2021, 41(11): 3257-3265.
|
[7] |
WANG Yunye, CHENG Yage, JIA Zhijuan, FU Junjun, YANG Yanyan, HE Yuchu, MA Wei.
Auditable signature scheme for blockchain based on secure multi-party
[J]. Journal of Computer Applications, 2020, 40(9): 2639-2645.
|
[8] |
ZHANG Guochao, WANG Ruijin.
Blockchain shard storage model based on threshold secret sharing
[J]. Journal of Computer Applications, 2019, 39(9): 2617-2622.
|
[9] |
CHENG Yage, JIA Zhijuan, HU Mingsheng, GONG Bei, WANG Lipeng.
Threshold signature scheme suitable for blockchain electronic voting scenes
[J]. Journal of Computer Applications, 2019, 39(9): 2629-2635.
|
[10] |
CHEN Hong, LIU Yumeng, XIAO Chenglong, GUO Pengfei, XIAO Zhenjiu.
Improved RC4 algorithm based on elliptic curve
[J]. Journal of Computer Applications, 2019, 39(8): 2339-2345.
|
[11] |
SHI Zhicai, WANG Yihan, ZHANG Xiaomei, CHEN Shanshan, CHEN Jiwei.
Provable radio frequency identification authentication protocol with scalability
[J]. Journal of Computer Applications, 2019, 39(3): 774-778.
|
[12] |
QIN Pingle, LI Qi, ZENG Jianchao, ZHANG Na, SONG Yulong.
Image retrieval algorithm for pulmonary nodules based on multi-scale dense network
[J]. Journal of Computer Applications, 2019, 39(2): 392-397.
|
[13] |
LUO Xiaoshuang, YANG Xiaoyuan, WANG Xu'an.
A private set intersection protocol against malicious attack
[J]. Journal of Computer Applications, 2017, 37(6): 1593-1598.
|
[14] |
YUAN Dazeng, HE Mingxing, LI Xiao, ZENG Shengke.
Private information retrieval protocol based on point function secret sharing
[J]. Journal of Computer Applications, 2017, 37(2): 494-498.
|
[15] |
XU Xiaojie, WANG Lisheng.
Birkhoff interpolation-based verifiable hierarchical threshold secret sharing algorithm
[J]. Journal of Computer Applications, 2016, 36(4): 952-955.
|