Journal of Computer Applications ›› 2014, Vol. 34 ›› Issue (7): 1884-1889.DOI: 10.11772/j.issn.1001-9081.2014.07.1884
Previous Articles Next Articles
YANG Chao1,2,ZHANG Hongqi1,2,YANG Zhi2,3,SHAN Dibin2,3
Received:2014-01-13
															
							
																	Revised:2014-02-27
															
							
															
							
							
																	Online:2014-08-01
															
							
																	Published:2014-07-01
															
							
						Contact:
								YANG Chao   
													杨超1,2,张红旗1,2,杨智2,3,单棣斌2,3
通讯作者:
					杨超
							作者简介:基金资助:国家973计划项目;国家863计划项目;信息保障技术重点实验室开放基金资助项目
CLC Number:
YANG Chao ZHANG Hongqi YANG Zhi SHAN Dibin. Radio frequency identification group proof protocol based on secret key-sharing tree[J]. Journal of Computer Applications, 2014, 34(7): 1884-1889.
杨超 张红旗 杨智 单棣斌. 基于秘密共享密钥树的无线射频识别组证明协议[J]. 计算机应用, 2014, 34(7): 1884-1889.
Add to citation manager EndNote|Ris|BibTeX
URL: https://www.joca.cn/EN/10.11772/j.issn.1001-9081.2014.07.1884
|   [1]ZHANG Z, XU Q. Universal composable grouping-proof protocol for RFID tags in the Internet of things[J]. Chinese Journal of Computers, 2011,34(7):1188-1194.(张忠, 徐秋亮. 物联网环境下UC安全的组证明RFID协议[J]. 计算机学报, 2011,34(7):1188-1194.)  | 
									
| [1] | 
														SHE Wei, MA Tianxiang, FENG Haige, TIAN Zhao, LIU Wei. 
														
															Blockchain covert communication method based on contract call concealment#br#
 
	#br#
 
														[J]. Journal of Computer Applications, 0, (): 0-0.
													 | 
												
| [2] | Rui GAO, Xuebin CHEN, Zucuan ZHANG. Dynamic social network privacy publishing method for partial graph updating [J]. Journal of Computer Applications, 2024, 44(12): 3831-3838. | 
| [3] | Yong XIANG, Yanjun LI, Dingyun HUANG, Yu CHEN, Huiqin XIE. Differential and linear characteristic analysis of full-round Shadow algorithm [J]. Journal of Computer Applications, 2024, 44(12): 3839-3843. | 
| [4] | Zhenhao ZHAO, Shibin ZHANG, Wunan WAN, Jinquan ZHANG, zhi QIN. Delegated proof of stake consensus algorithm based on reputation value and strong blind signature algorithm [J]. Journal of Computer Applications, 2024, 44(12): 3717-3722. | 
| [5] | Yiting WANG, Wunan WAN, Shibin ZHANG, Jinquan ZHANG, Zhi QIN. Linkable ring signature scheme based on SM9 algorithm [J]. Journal of Computer Applications, 2024, 44(12): 3709-3716. | 
| [6] | Jing LIANG, Wunan WAN, Shibin ZHANG, Jinquan ZHANG, Zhi QIN. Traceability storage model of charity system oriented to master-slave chain [J]. Journal of Computer Applications, 2024, 44(12): 3751-3758. | 
| [7] | Deyuan LIU, Jingquan ZHANG, Xing ZHANG, Wunan WAN, Shibin ZHANG, Zhi QIN. Cross-chain identity authentication scheme based on certificate-less signcryption [J]. Journal of Computer Applications, 2024, 44(12): 3731-3740. | 
| [8] | Xin ZHANG, Jinquan ZHANG, Deyuan LIU, Wunan WAN, Shibin ZHANG, Zhi QIN. Cross-chain identity management scheme based on identity-based proxy re-encryption [J]. Journal of Computer Applications, 2024, 44(12): 3723-3730. | 
| [9] | 
														DENG Yilin, YU Fajiang. 
														
															Pseudo-random number generator based on LSTM and separable self-attention mechanism#br#
 
	#br#
 
														[J]. Journal of Computer Applications, 0, (): 0-0.
													 | 
												
| [10] | . Correlation power analysis of advanced encryption standard algorithm based on uniform manifold approximation and projection [J]. Journal of Computer Applications, 0, (): 0-0. | 
| [11] | . Dynamic searchable encryption scheme based on puncture pseudorandom function [J]. Journal of Computer Applications, 0, (): 0-0. | 
| [12] | . fedPF: Federated learning for personalization and fairness [J]. Journal of Computer Applications, 0, (): 0-0. | 
| [13] | . Review of research on conflict-based cache side-channel attacks and eviction sets [J]. Journal of Computer Applications, 0, (): 0-0. | 
| [14] | . Secure and efficient frequency estimation method based on shuffled differential privacy [J]. Journal of Computer Applications, 0, (): 0-0. | 
| [15] | . Blockchain-based model for notarization of simulation testing data in autonomous driving [J]. Journal of Computer Applications, 0, (): 0-0. | 
| Viewed | ||||||
| 
										Full text | 
									
										 | 
								|||||
| 
										Abstract | 
									
										 | 
								|||||