[1] |
Xudong LI, Yukang FENG, Junsheng CHEN.
Multi-key page-level encryption system for SQLite
[J]. Journal of Computer Applications, 2024, 44(9): 2791-2801.
|
[2] |
Xiaoling SUN, Danhui WANG, Shanshan LI.
Dynamic ciphertext sorting and retrieval scheme based on blockchain
[J]. Journal of Computer Applications, 2024, 44(8): 2500-2505.
|
[3] |
Peigen GAO, Bin SUO.
Experimental design and staged PSO-Kriging modeling based on weighted hesitant fuzzy set
[J]. Journal of Computer Applications, 2024, 44(7): 2144-2150.
|
[4] |
Xiaofang LIU, Jun ZHANG.
Probability-driven dynamic multiobjective evolutionary optimization for multi-agent cooperative scheduling
[J]. Journal of Computer Applications, 2024, 44(5): 1372-1377.
|
[5] |
Xiaoxin DU, Wei ZHOU, Hao WANG, Tianru HAO, Zhenfei WANG, Mei JIN, Jianfei ZHANG.
Survey of subgroup optimization strategies for intelligent algorithms
[J]. Journal of Computer Applications, 2024, 44(3): 819-830.
|
[6] |
Gaimei GAO, Jin ZHANG, Chunxia LIU, Weichao DANG, Shangwang BAI.
Privacy protection scheme for crowdsourced testing tasks based on blockchain and CP-ABE policy hiding
[J]. Journal of Computer Applications, 2024, 44(3): 811-818.
|
[7] |
Qingyu YUAN, Tiegang GAO.
Reversible information hiding based on pixel prediction and secret image sharing
[J]. Journal of Computer Applications, 2024, 44(3): 780-787.
|
[8] |
Zhen WANG, Shanshan ZHANG, Binyang WU, Wanhua SU.
Optimization strategy of tandem composite turbine energy storage based on self-adaptive particle swarm optimization algorithm
[J]. Journal of Computer Applications, 2024, 44(2): 611-618.
|
[9] |
Haifeng MA, Yuxia LI, Qingshui XUE, Jiahai YANG, Yongfu GAO.
Attribute-based encryption scheme for blockchain privacy protection
[J]. Journal of Computer Applications, 2024, 44(2): 485-489.
|
[10] |
Yong LIU, Kun YANG.
Competitive location model and algorithm of new energy vehicle battery recycling outlets
[J]. Journal of Computer Applications, 2024, 44(2): 595-603.
|
[11] |
Zheng WANG, Jingwei WANG, Xinchun YIN.
Searchable electronic health record sharing scheme with user revocation
[J]. Journal of Computer Applications, 2024, 44(2): 504-511.
|
[12] |
Peng PENG, Zhiwei NI, Xuhui ZHU, Qian CHEN.
Interference trajectory publication based on improved glowworm swarm algorithm and differential privacy
[J]. Journal of Computer Applications, 2024, 44(2): 496-503.
|
[13] |
Jing LIANG, Wunan WAN, Shibin ZHANG, Jinquan ZHANG, Zhi QIN.
Traceability storage model of charity system oriented to master-slave chain
[J]. Journal of Computer Applications, 2024, 44(12): 3751-3758.
|
[14] |
Xin ZHANG, Jinquan ZHANG, Deyuan LIU, Wunan WAN, Shibin ZHANG, Zhi QIN.
Cross-chain identity management scheme based on identity-based proxy re-encryption
[J]. Journal of Computer Applications, 2024, 44(12): 3723-3730.
|
[15] |
Keshuo SUN, Haiying GAO, Yang SONG.
Multi-authority attribute-based encryption scheme for private blockchain over public blockchain
[J]. Journal of Computer Applications, 2024, 44(12): 3699-3708.
|