[1] |
Xinyuan YIN, Xiaojian ZHENG, Jinbo XIONG.
Two-round three-party password-authenticated key exchange protocol over lattices without non-interactive zero-knowledge proof
[J]. Journal of Computer Applications, 2024, 44(3): 805-810.
|
[2] |
Shaochen HAO, Zizuan WEI, Yao MA, Dan YU, Yongle CHEN.
Network intrusion detection model based on efficient federated learning algorithm
[J]. Journal of Computer Applications, 2023, 43(4): 1169-1175.
|
[3] |
Hongliang TIAN, Ping GE, Mingjie XIAN.
Distribution network operation exception management mechanism based on blockchain
[J]. Journal of Computer Applications, 2023, 43(11): 3504-3509.
|
[4] |
Xiuping ZHU, Yali LIU, Changlu LIN, Tao LI, Yongquan DONG.
Efficient certificateless ring signature scheme based on elliptic curve
[J]. Journal of Computer Applications, 2023, 43(11): 3368-3374.
|
[5] |
Jingyu SUN, Jiayu ZHU, Ziqiang TIAN, Guozhen SHI, Chuanjiang GUAN.
Attribute based encryption scheme based on elliptic curve cryptography and supporting revocation
[J]. Journal of Computer Applications, 2022, 42(7): 2094-2103.
|
[6] |
Zexi WANG, Minqing ZHANG, Yan KE, Yongjun KONG.
Reversible data hiding algorithm in encrypted domain based on secret image sharing
[J]. Journal of Computer Applications, 2022, 42(5): 1480-1489.
|
[7] |
Shengwei XU, Jie KANG.
Multiparty quantum key agreement protocol based on logical single particle
[J]. Journal of Computer Applications, 2022, 42(1): 157-161.
|
[8] |
MA Hua, CHEN Yuepeng, TANG Wensheng, LOU Xiaoping, HUANG Zhuoxuan.
Survey of research progress on crowdsourcing task assignment for evaluation of workers’ ability
[J]. Journal of Computer Applications, 2021, 41(8): 2232-2241.
|
[9] |
DU Xinyu, WANG Huaqun.
Dynamic group based effective identity authentication and key agreement scheme in LTE-A networks
[J]. Journal of Computer Applications, 2021, 41(6): 1715-1722.
|
[10] |
Ping ZHANG, Yiqiao JIA, Jiechang WANG, Nianfeng SHI.
Three-factor anonymous authentication and key agreement protocol
[J]. Journal of Computer Applications, 2021, 41(11): 3281-3287.
|
[11] |
CHEN Hong, LIU Yumeng, XIAO Chenglong, GUO Pengfei, XIAO Zhenjiu.
Improved RC4 algorithm based on elliptic curve
[J]. Journal of Computer Applications, 2019, 39(8): 2339-2345.
|
[12] |
XIAO Kai, WANG Meng, TANG Xinyu, JIANG Tonghai.
Public welfare time bank system based on blockchain technology
[J]. Journal of Computer Applications, 2019, 39(7): 2156-2161.
|
[13] |
ZENG Jianping, CHEN Qile, WU Chengrong, FANG Xi.
Analysis method of passwords under Chinese context
[J]. Journal of Computer Applications, 2019, 39(6): 1713-1718.
|
[14] |
LIU Xindong, XU Shuishuai, CHEN Jianhua.
Authentication scheme for smart grid communication based on elliptic curve cryptography
[J]. Journal of Computer Applications, 2019, 39(3): 779-783.
|
[15] |
LUO Xiaofeng, YANG Xingchun, HU Yong.
Improved decision diagram for attribute-based access control policy evaluation and management
[J]. Journal of Computer Applications, 2019, 39(12): 3569-3574.
|