[1] |
Deyuan LIU, Jingquan ZHANG, Xing ZHANG, Wunan WAN, Shibin ZHANG, Zhi QIN.
Cross-chain identity authentication scheme based on certificate-less signcryption
[J]. Journal of Computer Applications, 2024, 44(12): 3731-3740.
|
[2] |
Jianyang CUI, Ying CAI, Yu ZHANG, Yanfang FAN.
Authenticatable privacy-preserving scheme based on signcryption from lattice for vehicular ad hoc network
[J]. Journal of Computer Applications, 2024, 44(1): 233-241.
|
[3] |
XIAO Yuelei, DENG Xiaofan.
Improvement and analysis of certificate-based wired local area network security association scheme
[J]. Journal of Computer Applications, 2021, 41(7): 1970-1976.
|
[4] |
ZHANG Xuewang, YIN Zijie, FENG Jiaqi, YE Caijin, FU Kang.
Data trading scheme based on blockchain and trusted computing
[J]. Journal of Computer Applications, 2021, 41(4): 939-944.
|
[5] |
JIANG Zetao, XU Juanjuan.
Heterogenous cross-domain identity authentication scheme based on signcryption in cloud environment
[J]. Journal of Computer Applications, 2020, 40(3): 740-746.
|
[6] |
QI Neng, TAN Liang.
Trust chain model with waterfall characteristic based on trusted virtualization platform
[J]. Journal of Computer Applications, 2018, 38(2): 327-336.
|
[7] |
XU Mingdi, GAO Yang, GAO Xueyuan, ZHANG Fan.
Correspondence property-based platform configuration attestation
[J]. Journal of Computer Applications, 2018, 38(2): 337-342.
|
[8] |
SU Jingfeng, LIU Juxia.
Efficient certificateless aggregate signcryption scheme without bilinear pairings
[J]. Journal of Computer Applications, 2018, 38(2): 374-378.
|
[9] |
XIAO Yuelei, WU Junsheng, ZHU Zhixiang.
Improvement and analysis of LAN security association scheme based on pre-shared key
[J]. Journal of Computer Applications, 2018, 38(11): 3246-3251.
|
[10] |
HU Xiaoyan, WANG Jingyu, LI Hairong.
Range query authentication for outsourced spatial databases
[J]. Journal of Computer Applications, 2017, 37(4): 1021-1025.
|
[11] |
SUN Liang, CHEN Xiaochun, ZHENG Shujian, LIU Ying.
Research and application for terminal location management system based on firmware
[J]. Journal of Computer Applications, 2017, 37(2): 417-421.
|
[12] |
LIU Mingye, HAN Yiliang, YANG Xiaoyuan.
Signcryption scheme based on low-density generator-matrix code
[J]. Journal of Computer Applications, 2016, 36(9): 2459-2464.
|
[13] |
ZHANG Xin, YANG Xiaoyuan, ZHU Shuaishuai.
Trusted and anonymous authentication protocol for mobile networks
[J]. Journal of Computer Applications, 2016, 36(8): 2231-2235.
|
[14] |
LIU Jianhua, MAO Kefei, HU Junwei.
Certificateless aggregate signcryption scheme based on bilinear pairings
[J]. Journal of Computer Applications, 2016, 36(6): 1558-1562.
|
[15] |
ZUO Liming, CHEN Renqun, GUO Hongli.
Provable identity-based signcryption scheme
[J]. Journal of Computer Applications, 2015, 35(3): 712-716.
|