| [1] | Chaoying YAN, Ziyi ZHANG, Yingnan QU, Qiuyu LI, Dixiang ZHENG, Lijun SUN. 
														
															Double auction carbon trading based on consortium blockchain
														[J]. Journal of Computer Applications, 2024, 44(10): 3240-3245. | 
																																																																																
													| [2] | Peiyao ZHANG, Xiaodong FU. 
														
															Incentive mechanism of crowdsourcing multi-task assignment against malicious bidding
														[J]. Journal of Computer Applications, 2024, 44(1): 261-268. | 
																																																																																
													| [3] | Jingyi WANG, Chao LI, Heng SONG, Di LI, Junwu ZHU. 
														
															Spectrum combinatorial auction mechanism based on random walk algorithm
														[J]. Journal of Computer Applications, 2023, 43(8): 2352-2357. | 
																																																																																
													| [4] | Jiaxing LU, Hua DAI, Yuanlong LIU, Qian ZHOU, Geng YANG. 
														
															Dictionary partition vector space model for ciphertext ranked search in cloud environment
														[J]. Journal of Computer Applications, 2023, 43(7): 1994-2000. | 
																																																																																
													| [5] | Yanan PAN, Qingxian PAN, Zhaoyi YU, Jiajing CHU, Song YU. 
														
															Online incentive mechanism based on quality perception in spatio-temporal crowdsourcing
														[J]. Journal of Computer Applications, 2023, 43(7): 2091-2099. | 
																																																																																
													| [6] | Jingyu SUN, Jiayu ZHU, Ziqiang TIAN, Guozhen SHI, Chuanjiang GUAN. 
														
															Attribute based encryption scheme based on elliptic curve cryptography and supporting revocation
														[J]. Journal of Computer Applications, 2022, 42(7): 2094-2103. | 
																																																																																
													| [7] | Jinquan ZHANG, Shouwei XU, Xincheng LI, Chongyang WANG, Jingzhi XU. 
														
															Cloud computing task scheduling based on orthogonal adaptive whale optimization
														[J]. Journal of Computer Applications, 2022, 42(5): 1516-1523. | 
																																																																																
													| [8] | CHEN Jiahao, YIN Xinchun. 
														
															Traceable and revocable ciphertext-policy attribute-based encryption scheme based on cloud-fog computing
														[J]. Journal of Computer Applications, 2021, 41(6): 1611-1620. | 
																																																																																
													| [9] | GE Lina, HU Yugu, ZHANG Guifen, CHEN Yuanyuan. 
														
															Reverse hybrid access control scheme based on object attribute matching in cloud computing environment
														[J]. Journal of Computer Applications, 2021, 41(6): 1604-1610. | 
																																																																																
													| [10] | LI Bei, ZHANG Wenyin, WANG Jiuru, ZHAO Wei, WANG Haifeng. 
														
															Sealed-bid auction scheme based on blockchain
														[J]. Journal of Computer Applications, 2021, 41(4): 999-1004. | 
																																																																																
													| [11] | YANG Ling, JIANG Chunmao. 
														
															Strategy of energy-aware virtual machine migration based on three-way decision
														[J]. Journal of Computer Applications, 2021, 41(4): 990-998. | 
																																																																																
													| [12] | ZHU Yongjin, YIN Fei, DOU Longlong, WU Kun, ZHANG Zhiwei, QIAN Zhuzhong. 
														
															Adaptive network transmission mechanism based on forward error correction
														[J]. Journal of Computer Applications, 2021, 41(3): 825-832. | 
																																																																																
													| [13] | Xiaoling SUN, Guang YANG, Yanping SHEN, Qiuge YANG, Tao CHEN. 
														
															Searchable encryption scheme based on splittable inverted index
														[J]. Journal of Computer Applications, 2021, 41(11): 3288-3294. | 
																																																																																
													| [14] | LYU Jiayu, ZHU Zhirong, YAO Zhiqiang. 
														
															Two-channel dynamic data encryption strategy in cloud computing environment
														[J]. Journal of Computer Applications, 2020, 40(8): 2268-2273. | 
																																																																																
													| [15] | GUO Shujie, LI Zhihua, LIN Kaiqing. 
														
															Fuzzy membership degree based virtual machine placement algorithmin cloud environment
														[J]. Journal of Computer Applications, 2020, 40(5): 1374-1381. |