[1] |
Jintao RAO, Zhe CUI.
Electronic voting scheme based on SM2 threshold blind signature
[J]. Journal of Computer Applications, 2024, 44(2): 512-518.
|
[2] |
Songbai LAN, Fangxiao LI, Leyi SHI.
CFL-based authentication and communication scheme for industrial control system
[J]. Journal of Computer Applications, 2023, 43(4): 1183-1190.
|
[3] |
Xiaohan GUO, Zhongyuan YAO, Yong ZHANG, Shangkun GUO, Chao WANG, Xueming SI.
Cross-chain privacy protection scheme of consortium blockchain based on improved notary mechanism
[J]. Journal of Computer Applications, 2023, 43(10): 3028-3037.
|
[4] |
Yangnan GUO, Wenbao JIANG, Shuai YE.
Supervisable blockchain anonymous transaction system model
[J]. Journal of Computer Applications, 2022, 42(9): 2757-2764.
|
[5] |
Jingyu SUN, Jiayu ZHU, Ziqiang TIAN, Guozhen SHI, Chuanjiang GUAN.
Attribute based encryption scheme based on elliptic curve cryptography and supporting revocation
[J]. Journal of Computer Applications, 2022, 42(7): 2094-2103.
|
[6] |
GU Zhengchuan, GUO Yuanbo, FANG Chen.
End-to-end security solution for message queue telemetry transport protocol based on proxy re-encryption
[J]. Journal of Computer Applications, 2021, 41(5): 1378-1385.
|
[7] |
Guangfu WU, Ziheng DAI.
Cascaded quasi-cyclic moderate-density parity-check code based public key scheme for resisting reaction attack
[J]. Journal of Computer Applications, 2021, 41(11): 3274-3280.
|
[8] |
WANG Zhong, HAN Yiliang.
Dual public-key cryptographic scheme based on improved Niederreiter cryptosystem
[J]. Journal of Computer Applications, 2019, 39(7): 1997-2000.
|
[9] |
LIU Xindong, XU Shuishuai, CHEN Jianhua.
Authentication scheme for smart grid communication based on elliptic curve cryptography
[J]. Journal of Computer Applications, 2019, 39(3): 779-783.
|
[10] |
LIU Xiangxin, YANG Xiaoyuan.
Improvement of Niederreiter public key cryptosystem
[J]. Journal of Computer Applications, 2018, 38(7): 1956-1959.
|
[11] |
LIU Xiangxin, YANG Xiaoyuan.
Improvement of hybrid encryption scheme based on Niederreiter coding
[J]. Journal of Computer Applications, 2018, 38(6): 1644-1647.
|
[12] |
WANG Zewu, SUN Lei, GUO Songhui, SUN Ruichen.
Scheduling method of virtual cipher machine based on entropy weight evaluation in cryptography cloud
[J]. Journal of Computer Applications, 2018, 38(5): 1353-1359.
|
[13] |
XU Jiaqing, WAN Wen, CAI Dongjing, TANG Fuqiao, HE Jie, ZHANG Lei.
Implementation of deterministic routing fault-tolerant strategies for K-Ary N-Bridge system
[J]. Journal of Computer Applications, 2018, 38(5): 1393-1398.
|
[14] |
XU Hailin, LU Yang.
Efficient bilinear-pairing-free certificate-based encryption scheme with keyword search
[J]. Journal of Computer Applications, 2018, 38(2): 379-385.
|
[15] |
SHAO Dongyang, KANG Baoyuan, WANG Jiaqiang.
Analysis and improvement of two electronic cash schemes
[J]. Journal of Computer Applications, 2018, 38(2): 386-389.
|