[1] |
Deyuan LIU, Jingquan ZHANG, Xing ZHANG, Wunan WAN, Shibin ZHANG, Zhi QIN.
Cross-chain identity authentication scheme based on certificate-less signcryption
[J]. Journal of Computer Applications, 2024, 44(12): 3731-3740.
|
[2] |
Jianyang CUI, Ying CAI, Yu ZHANG, Yanfang FAN.
Authenticatable privacy-preserving scheme based on signcryption from lattice for vehicular ad hoc network
[J]. Journal of Computer Applications, 2024, 44(1): 233-241.
|
[3] |
Juangui NING, Guofang DONG.
Blockchain-based vehicle-to-infrastructure fast handover authentication scheme in VANET
[J]. Journal of Computer Applications, 2024, 44(1): 252-260.
|
[4] |
Songbai LAN, Fangxiao LI, Leyi SHI.
CFL-based authentication and communication scheme for industrial control system
[J]. Journal of Computer Applications, 2023, 43(4): 1183-1190.
|
[5] |
Guishuang XU, Xinchun YIN.
Certificateless conditional privacy-preserving authentication scheme for VANET
[J]. Journal of Computer Applications, 2023, 43(11): 3358-3367.
|
[6] |
Changgeng LIU, Yali LIU, Qipeng LU, Tao LI, Changlu LIN, Yi ZHU.
Vehicle RKE two-factor authentication protocol resistant to physical cloning attack
[J]. Journal of Computer Applications, 2023, 43(11): 3375-3384.
|
[7] |
Yangnan GUO, Wenbao JIANG, Shuai YE.
Supervisable blockchain anonymous transaction system model
[J]. Journal of Computer Applications, 2022, 42(9): 2757-2764.
|
[8] |
Hongliang TIAN, Jiayue WANG, Chenxi LI.
Data storage scheme based on hybrid algorithm blockchain and node identity authentication
[J]. Journal of Computer Applications, 2022, 42(8): 2481-2486.
|
[9] |
Jie ZHANG, Shanshan XU, Lingyun YUAN.
Internet of things access control model based on blockchain and edge computing
[J]. Journal of Computer Applications, 2022, 42(7): 2104-2111.
|
[10] |
Jingwen WU, Xinchun YIN, Jianting NING.
Revocable aggregate signature authentication scheme for vehicular ad hoc networks
[J]. Journal of Computer Applications, 2022, 42(3): 911-920.
|
[11] |
XIAO Yuelei, DENG Xiaofan.
Improvement and analysis of certificate-based wired local area network security association scheme
[J]. Journal of Computer Applications, 2021, 41(7): 1970-1976.
|
[12] |
DU Xinyu, WANG Huaqun.
Dynamic group based effective identity authentication and key agreement scheme in LTE-A networks
[J]. Journal of Computer Applications, 2021, 41(6): 1715-1722.
|
[13] |
WU Kaifan, YIN Xinchun.
Lightweight anonymous mutual authentication protocol based on random operators for radio frequency identification system
[J]. Journal of Computer Applications, 2021, 41(6): 1621-1630.
|
[14] |
Ping ZHANG, Yiqiao JIA, Jiechang WANG, Nianfeng SHI.
Three-factor anonymous authentication and key agreement protocol
[J]. Journal of Computer Applications, 2021, 41(11): 3281-3287.
|
[15] |
ZHANG Xinglan, ZHAO Yijing.
Two-way synchronous quantum identity authentication protocol based on single photon
[J]. Journal of Computer Applications, 2020, 40(9): 2634-2638.
|