[1] |
Meihong CHEN, Lingyun YUAN, Tong XIA.
Data classified and graded access control model based on master-slave multi-chain
[J]. Journal of Computer Applications, 2024, 44(4): 1148-1157.
|
[2] |
Xin LI, Liyong BAO, Hongwei DING, Zheng GUAN.
MAC layer scheduling strategy of roadside units based on MEC server priority service
[J]. Journal of Computer Applications, 2024, 44(4): 1227-1235.
|
[3] |
Gaimei GAO, Mingbo DUAN, Yaling XUN, Chunxia LIU, Weichao DANG.
SM9-based attribute-based searchable encryption scheme with cryptographic reverse firewall
[J]. Journal of Computer Applications, 2024, 44(11): 3495-3502.
|
[4] |
Huan ZHANG, Jingyu WANG, Lixin LIU, Xiaoyu JIANG.
Multi-organization collaborative data sharing scheme with dual authorization
[J]. Journal of Computer Applications, 2024, 44(10): 3307-3314.
|
[5] |
Haiying MA, Jinzhou LI, Jikun YANG.
Blockchain-based decentralized attribute-based encryption scheme for revocable attributes
[J]. Journal of Computer Applications, 2023, 43(9): 2789-2797.
|
[6] |
Jiaxing LU, Hua DAI, Yuanlong LIU, Qian ZHOU, Geng YANG.
Dictionary partition vector space model for ciphertext ranked search in cloud environment
[J]. Journal of Computer Applications, 2023, 43(7): 1994-2000.
|
[7] |
Meng CAO, Sunjie YU, Hui ZENG, Hongzhou SHI.
Hierarchical access control and sharing system of medical data based on blockchain
[J]. Journal of Computer Applications, 2023, 43(5): 1518-1526.
|
[8] |
Kun YOU, Qinhui WANG, Xin LI.
General multi-unit false-name-proof auction mechanism for cloud computing
[J]. Journal of Computer Applications, 2023, 43(11): 3351-3357.
|
[9] |
Jingyu SUN, Jiayu ZHU, Ziqiang TIAN, Guozhen SHI, Chuanjiang GUAN.
Attribute based encryption scheme based on elliptic curve cryptography and supporting revocation
[J]. Journal of Computer Applications, 2022, 42(7): 2094-2103.
|
[10] |
Jie ZHANG, Shanshan XU, Lingyun YUAN.
Internet of things access control model based on blockchain and edge computing
[J]. Journal of Computer Applications, 2022, 42(7): 2104-2111.
|
[11] |
Yang LI, Long XU, Yanqiang LI, Shaopeng LI.
Smart contract-based access control architecture and verification for internet of things
[J]. Journal of Computer Applications, 2022, 42(6): 1922-1931.
|
[12] |
Jinquan ZHANG, Shouwei XU, Xincheng LI, Chongyang WANG, Jingzhi XU.
Cloud computing task scheduling based on orthogonal adaptive whale optimization
[J]. Journal of Computer Applications, 2022, 42(5): 1516-1523.
|
[13] |
GE Jihong, SHEN Tao.
Energy data access control method based on blockchain
[J]. Journal of Computer Applications, 2021, 41(9): 2615-2622.
|
[14] |
CHEN Jiahao, YIN Xinchun.
Traceable and revocable ciphertext-policy attribute-based encryption scheme based on cloud-fog computing
[J]. Journal of Computer Applications, 2021, 41(6): 1611-1620.
|
[15] |
GE Lina, HU Yugu, ZHANG Guifen, CHEN Yuanyuan.
Reverse hybrid access control scheme based on object attribute matching in cloud computing environment
[J]. Journal of Computer Applications, 2021, 41(6): 1604-1610.
|