[1] |
Jintao RAO, Zhe CUI.
Electronic voting scheme based on SM2 threshold blind signature
[J]. Journal of Computer Applications, 2024, 44(2): 512-518.
|
[2] |
Zhenhao ZHAO, Shibin ZHANG, Wunan WAN, Jinquan ZHANG, zhi QIN.
Delegated proof of stake consensus algorithm based on reputation value and strong blind signature algorithm
[J]. Journal of Computer Applications, 2024, 44(12): 3717-3722.
|
[3] |
Yiting WANG, Wunan WAN, Shibin ZHANG, Jinquan ZHANG, Zhi QIN.
Linkable ring signature scheme based on SM9 algorithm
[J]. Journal of Computer Applications, 2024, 44(12): 3709-3716.
|
[4] |
Huan ZHANG, Jingyu WANG, Lixin LIU, Xiaoyu JIANG.
Multi-organization collaborative data sharing scheme with dual authorization
[J]. Journal of Computer Applications, 2024, 44(10): 3307-3314.
|
[5] |
Jinbo LI, Ping ZHANG, Ji ZHANG, Muhua LIU.
Identity-based ring signature scheme on number theory research unit lattice
[J]. Journal of Computer Applications, 2023, 43(9): 2798-2805.
|
[6] |
Xiuping ZHU, Yali LIU, Changlu LIN, Tao LI, Yongquan DONG.
Efficient certificateless ring signature scheme based on elliptic curve
[J]. Journal of Computer Applications, 2023, 43(11): 3368-3374.
|
[7] |
ZHAO Hong, YU Shuhan, HAN Yanyan, LI Zhaobin.
Analysis and improvement of certificateless signature scheme
[J]. Journal of Computer Applications, 2023, 43(1): 147-153.
|
[8] |
NONG Qiang, ZHANG Bangbang, OUYANG Yuhao.
Lattice-based hierarchical certificateless proxy signature scheme
[J]. Journal of Computer Applications, 2023, 43(1): 154-159.
|
[9] |
Jie ZHANG, Shanshan XU, Lingyun YUAN.
Internet of things access control model based on blockchain and edge computing
[J]. Journal of Computer Applications, 2022, 42(7): 2104-2111.
|
[10] |
Chunming TANG, Yuqing CHEN, Zidi ZHANG.
Improved consensus algorithm based on binomial swap forest and HotStuff
[J]. Journal of Computer Applications, 2022, 42(7): 2112-2117.
|
[11] |
Jingwen WU, Xinchun YIN, Jianting NING.
Revocable aggregate signature authentication scheme for vehicular ad hoc networks
[J]. Journal of Computer Applications, 2022, 42(3): 911-920.
|
[12] |
Qi LIU, Rongxin GUO, Wenxian JIANG, Dengji MA.
Parallel chain consensus algorithm optimization scheme based on Boneh-Lynn-Shacham aggregate signature technology
[J]. Journal of Computer Applications, 2022, 42(12): 3785-3791.
|
[13] |
Wenyong YUAN, Xiuguang LI, Ruifeng LI, Zhengge YI, Xiaoyuan YANG.
Trusted integrity verification scheme of cloud data without bilinear pairings
[J]. Journal of Computer Applications, 2022, 42(12): 3769-3774.
|
[14] |
Chao LIN, Debiao HE, Xinyi HUANG.
Blockchain‑based electronic medical record secure sharing
[J]. Journal of Computer Applications, 2022, 42(11): 3465-3472.
|
[15] |
Dong ZHU, Xinchun YIN, Jianting NING.
Certificateless signature scheme with strong privacy protection for internet of vehicles
[J]. Journal of Computer Applications, 2022, 42(10): 3091-3101.
|