[1] |
Zheng WANG, Jingwei WANG, Xinchun YIN.
Searchable electronic health record sharing scheme with user revocation
[J]. Journal of Computer Applications, 2024, 44(2): 504-511.
|
[2] |
Ziqian CHEN, Kedi NIU, Zhongyuan YAO, Xueming SI.
Review of blockchain lightweight technology applied to internet of things
[J]. Journal of Computer Applications, 2024, 44(12): 3688-3698.
|
[3] |
Chundong WANG, Xin JIANG.
Improved practical Byzantine fault tolerance algorithm based on verifiable delay function
[J]. Journal of Computer Applications, 2023, 43(11): 3484-3489.
|
[4] |
Wenyong YUAN, Xiuguang LI, Ruifeng LI, Zhengge YI, Xiaoyuan YANG.
Trusted integrity verification scheme of cloud data without bilinear pairings
[J]. Journal of Computer Applications, 2022, 42(12): 3769-3774.
|
[5] |
CHEN Hong, LIU Yumeng, XIAO Chenglong, GUO Pengfei, XIAO Zhenjiu.
Improved RC4 algorithm based on elliptic curve
[J]. Journal of Computer Applications, 2019, 39(8): 2339-2345.
|
[6] |
SHI Zhicai, WANG Yihan, ZHANG Xiaomei, CHEN Shanshan, CHEN Jiwei.
Provable radio frequency identification authentication protocol with scalability
[J]. Journal of Computer Applications, 2019, 39(3): 774-778.
|
[7] |
QIN Pingle, LI Qi, ZENG Jianchao, ZHANG Na, SONG Yulong.
Image retrieval algorithm for pulmonary nodules based on multi-scale dense network
[J]. Journal of Computer Applications, 2019, 39(2): 392-397.
|
[8] |
ZUO Liming, CHEN Zuosong, XIA Pingping, YI Chuanjia.
Efficient and provably secure short proxy signature scheme
[J]. Journal of Computer Applications, 2018, 38(12): 3455-3461.
|
[9] |
LI Haoyu, ZHANG Longjun, LI Qingpeng.
Dynamic provable data possession scheme based on B+ tree
[J]. Journal of Computer Applications, 2017, 37(7): 1931-1935.
|
[10] |
JIANG Tiejin, REN Yanli.
Secure outsourcing algorithm of bilinear pairings with single server
[J]. Journal of Computer Applications, 2016, 36(7): 1866-1869.
|
[11] |
LIU Jianhua, MAO Kefei, HU Junwei.
Certificateless aggregate signcryption scheme based on bilinear pairings
[J]. Journal of Computer Applications, 2016, 36(6): 1558-1562.
|
[12] |
TAO Yuan, ZHOU Xi, MA Yupeng, ZHAO Fan.
Mobile mutual authentication protocol based on Hash function
[J]. Journal of Computer Applications, 2016, 36(3): 657-660.
|
[13] |
REN Xiaokang, CHEN Peilin, CAO Yuan, LI Yanan, YANG Xiaodong.
Partially blind signature scheme with ID-based server-aided verification
[J]. Journal of Computer Applications, 2016, 36(11): 3098-3102.
|
[14] |
WANG Xiong, DENG Lunzhi.
Provably secure undeniable signature scheme based on identity
[J]. Journal of Computer Applications, 2016, 36(10): 2738-2741.
|
[15] |
MING Yang, YUAN Hongping, SUN Bian, QIAO Zhengyang.
Efficient identity-based anonymous broadcast encryption scheme in standard model
[J]. Journal of Computer Applications, 2016, 36(10): 2762-2766.
|