[1] |
Zhenhao ZHAO, Shibin ZHANG, Wunan WAN, Jinquan ZHANG, zhi QIN.
Delegated proof of stake consensus algorithm based on reputation value and strong blind signature algorithm
[J]. Journal of Computer Applications, 2024, 44(12): 3717-3722.
|
[2] |
NONG Qiang, ZHANG Bangbang, OUYANG Yuhao.
Lattice-based hierarchical certificateless proxy signature scheme
[J]. Journal of Computer Applications, 2023, 43(1): 154-159.
|
[3] |
ZHAO Hong, YU Shuhan, HAN Yanyan, LI Zhaobin.
Analysis and improvement of certificateless signature scheme
[J]. Journal of Computer Applications, 2023, 43(1): 147-153.
|
[4] |
DENG Xiwen, FENG Ziliang, QIU Chenpeng.
Face liveness detection method based on near-infrared and visible binocular vision
[J]. Journal of Computer Applications, 2020, 40(7): 2096-2103.
|
[5] |
ZUO Liming, CHEN Zuosong, XIA Pingping, YI Chuanjia.
Efficient and provably secure short proxy signature scheme
[J]. Journal of Computer Applications, 2018, 38(12): 3455-3461.
|
[6] |
REN Xiaokang, CHEN Peilin, CAO Yuan, LI Yanan, YANG Xiaodong.
Partially blind signature scheme with ID-based server-aided verification
[J]. Journal of Computer Applications, 2016, 36(11): 3098-3102.
|
[7] |
ZUO Liming, GUO Hongli, ZHANG Tingting, CHEN Zuosong.
Improved certificate-based aggregate proxy signature scheme
[J]. Journal of Computer Applications, 2016, 36(10): 2758-2761.
|
[8] |
HUANG Ping, YANG Xiaodong, LI Yan, WANG Caifen.
Identity-based proxy re-signature scheme without bilinear pairing
[J]. Journal of Computer Applications, 2015, 35(6): 1678-1682.
|
[9] |
WANG Qian, ZHENG Dong, REN Fang.
Code-based blind signature scheme
[J]. Journal of Computer Applications, 2015, 35(10): 2867-2871.
|
[10] |
WANG Yi DU Weizhang.
Security analysis and improvement of certificateless signature scheme without bilinear pairing
[J]. Journal of Computer Applications, 2013, 33(08): 2250-2252.
|
[11] |
TONG Ruiyang MENG Qingxian CHEN Ming.
Effective and secure identity-based hybrid signcryption scheme
[J]. Journal of Computer Applications, 2013, 33(05): 1382-1393.
|
[12] |
HE Junjie ZHANG Fan QI Chuanda.
New blind signature scheme without trusted private key generator
[J]. Journal of Computer Applications, 2013, 33(04): 1061-1064.
|
[13] |
HE Junjie SUN Fang QI Chuanda.
Cryptanalysis and improvement of ID-based partially blind signature scheme
[J]. Journal of Computer Applications, 2013, 33(03): 762-765.
|
[14] |
WANG Zhen LIU Pei-yu LI Feng-yin.
New certificateless threshold proxy blind signature scheme
[J]. Journal of Computer Applications, 2012, 32(11): 3140-3142.
|
[15] |
HE Jun-jie WANG Juan QI Chuan-da.
Secure and efficient ID-based partially blind signature scheme
[J]. Journal of Computer Applications, 2012, 32(05): 1388-1391.
|