[1] |
Xudong LI, Yukang FENG, Junsheng CHEN.
Multi-key page-level encryption system for SQLite
[J]. Journal of Computer Applications, 2024, 44(9): 2791-2801.
|
[2] |
Gaimei GAO, Jin ZHANG, Chunxia LIU, Weichao DANG, Shangwang BAI.
Privacy protection scheme for crowdsourced testing tasks based on blockchain and CP-ABE policy hiding
[J]. Journal of Computer Applications, 2024, 44(3): 811-818.
|
[3] |
Haifeng MA, Yuxia LI, Qingshui XUE, Jiahai YANG, Yongfu GAO.
Attribute-based encryption scheme for blockchain privacy protection
[J]. Journal of Computer Applications, 2024, 44(2): 485-489.
|
[4] |
Jing LIANG, Wunan WAN, Shibin ZHANG, Jinquan ZHANG, Zhi QIN.
Traceability storage model of charity system oriented to master-slave chain
[J]. Journal of Computer Applications, 2024, 44(12): 3751-3758.
|
[5] |
Xin ZHANG, Jinquan ZHANG, Deyuan LIU, Wunan WAN, Shibin ZHANG, Zhi QIN.
Cross-chain identity management scheme based on identity-based proxy re-encryption
[J]. Journal of Computer Applications, 2024, 44(12): 3723-3730.
|
[6] |
Keshuo SUN, Haiying GAO, Yang SONG.
Multi-authority attribute-based encryption scheme for private blockchain over public blockchain
[J]. Journal of Computer Applications, 2024, 44(12): 3699-3708.
|
[7] |
Gaimei GAO, Mingbo DUAN, Yaling XUN, Chunxia LIU, Weichao DANG.
SM9-based attribute-based searchable encryption scheme with cryptographic reverse firewall
[J]. Journal of Computer Applications, 2024, 44(11): 3495-3502.
|
[8] |
Haiying MA, Jinzhou LI, Jikun YANG.
Blockchain-based decentralized attribute-based encryption scheme for revocable attributes
[J]. Journal of Computer Applications, 2023, 43(9): 2789-2797.
|
[9] |
Jiaxing LU, Hua DAI, Yuanlong LIU, Qian ZHOU, Geng YANG.
Dictionary partition vector space model for ciphertext ranked search in cloud environment
[J]. Journal of Computer Applications, 2023, 43(7): 1994-2000.
|
[10] |
Zhenjie XIE, Wei FU.
Error replica recovery mechanism for cloud storage based on auditable multiple replicas
[J]. Journal of Computer Applications, 2023, 43(4): 1102-1108.
|
[11] |
Wenshuai SONG, Miaolei DENG, Mimi MA, Haochen LI.
Research progress in public-key encryption with keyword search
[J]. Journal of Computer Applications, 2023, 43(3): 794-803.
|
[12] |
Kun YOU, Qinhui WANG, Xin LI.
General multi-unit false-name-proof auction mechanism for cloud computing
[J]. Journal of Computer Applications, 2023, 43(11): 3351-3357.
|
[13] |
Suqing LIN, Shuhua ZHANG.
Attribute-based encryption scheme with verifiable search and non-monotonic access structure
[J]. Journal of Computer Applications, 2022, 42(9): 2772-2779.
|
[14] |
Jingyu SUN, Jiayu ZHU, Ziqiang TIAN, Guozhen SHI, Chuanjiang GUAN.
Attribute based encryption scheme based on elliptic curve cryptography and supporting revocation
[J]. Journal of Computer Applications, 2022, 42(7): 2094-2103.
|
[15] |
Jingwen WU, Xinchun YIN, Jianting NING.
Traceable and revocable multi-authority attribute-based encryption scheme for vehicular ad hoc networks
[J]. Journal of Computer Applications, 2022, 42(6): 1695-1701.
|