| [1] | Xiaohan GUO, Zhongyuan YAO, Yong ZHANG, Shangkun GUO, Chao WANG, Xueming SI. 
														
															Cross-chain privacy protection scheme of consortium blockchain based on improved notary mechanism
														[J]. Journal of Computer Applications, 2023, 43(10): 3028-3037. | 
																																																																																
													| [2] | Yangnan GUO, Wenbao JIANG, Shuai YE. 
														
															Supervisable blockchain anonymous transaction system model
														[J]. Journal of Computer Applications, 2022, 42(9): 2757-2764. | 
																																																																																
													| [3] | XIANG Xiong, TIAN Jian. 
														
															P2P transmission scheduling optimization based on software defined network
														[J]. Journal of Computer Applications, 2020, 40(3): 777-782. | 
																																																																																
													| [4] | XIN Yingying, LIU Xiaojuan, FANG Chunlin, LUO Huan. 
														
															Optimization of data retransmission algorithm in information centric networking
														[J]. Journal of Computer Applications, 2019, 39(3): 829-833. | 
																																																																																
													| [5] | LONG Dan, LI Xiaohui, DING Yuemin. 
														
															Multicast routing of power grid based on demand response constraints
														[J]. Journal of Computer Applications, 2018, 38(4): 1102-1105. | 
																																																																																
													| [6] | XU Guangxian, ZHAO Yue, LAI Junning. 
														
															Deterministic layered construction algorithm based on network coding
														[J]. Journal of Computer Applications, 2018, 38(3): 769-775. | 
																																																																																
													| [7] | CHEN Hao, WU Qiwu, LI Fang, JIANG Lingzhi. 
														
															Hierarchical PCE-based and bimatrix game-based multicast dedicated protection algorithm in multi-domain optical network under static state
														[J]. Journal of Computer Applications, 2018, 38(11): 3299-3304. | 
																																																																																
													| [8] | ZHOU Kunxiao, ZHAO Hui, YUAN Huaqiang. 
														
															Multicast routing in cognitive radio networks: algorithms and protocols
														[J]. Journal of Computer Applications, 2017, 37(2): 422-426. | 
																																																																																
													| [9] | WANG Xiong, DENG Lunzhi. 
														
															Provably secure undeniable signature scheme based on identity
														[J]. Journal of Computer Applications, 2016, 36(10): 2738-2741. | 
																																																																																
													| [10] | HUANG Ping, YANG Xiaodong, LI Yan, WANG Caifen. 
														
															Identity-based proxy re-signature scheme without bilinear pairing
														[J]. Journal of Computer Applications, 2015, 35(6): 1678-1682. | 
																																																																																
													| [11] | PU Baoxing, ZHU Hongpeng, ZHAO Chenglin. 
														
															Achievable information rate region of multi-source multi-sink multicast network coding
														[J]. Journal of Computer Applications, 2015, 35(6): 1546-1551. | 
																																																																																
													| [12] | PU Baoxing, ZHAO Chenglin. 
														
															Tradeoff between multicast rate and number of coding nodes based on network coding
														[J]. Journal of Computer Applications, 2015, 35(4): 929-933. | 
																																																																																
													| [13] | WANG Chongnan, WANG Zongtao, BAO Zhonggui, XING Hongwei. 
														
															Design of telemetry and command message-oriented middleware system with publish/subscribe model
														[J]. Journal of Computer Applications, 2015, 35(3): 878-881. | 
																																																																																
													| [14] | XU Jianzhen HE Tingting HE Dan ZHOU Tong. 
														
															Building algorithm for tree-ring application layer multicast based on ant colony algorithm
														[J]. Journal of Computer Applications, 2013, 33(12): 3449-3452. | 
																																																																																
													| [15] | SHEN Hua FENG Jing YIN Min MA Weijun JIANG Lei. 
														
															Optimization methods for application layer multicast
														[J]. Journal of Computer Applications, 2013, 33(12): 3389-3393. |