| [1] |
Ruiyang ZHANG, Mingjie ZHAO, Bing GUO, Pinghong JIANG.
On-chain data query optimization based on hybrid index
[J]. Journal of Computer Applications, 2026, 46(1): 77-84.
|
| [2] |
Wei SHE, Tianxiang MA, Haige FENG, Zhao TIAN, Wei LIU.
Blockchain covert communication method based on contract call concealment
[J]. Journal of Computer Applications, 2025, 45(9): 2865-2872.
|
| [3] |
Sheping ZHAI, Pengju ZHU, Rui YANG, Jiayiteng LIU.
Blockchain-based identity management system for internet of things
[J]. Journal of Computer Applications, 2025, 45(9): 2873-2881.
|
| [4] |
Wei GAO, Lihua LIU, Bintao HE, Fang’an DENG.
Research advances in blockchain consensus mechanisms and improvement algorithms
[J]. Journal of Computer Applications, 2025, 45(9): 2848-2864.
|
| [5] |
Yan YAN, Feifei LI, Yaqin LYU, Tao FENG.
Secure and efficient frequency estimation method based on shuffled differential privacy
[J]. Journal of Computer Applications, 2025, 45(8): 2600-2611.
|
| [6] |
Haiyang PENG, Weixing JI, Fawang LIU.
Blockchain-based data notarization model for autonomous driving simulation testing
[J]. Journal of Computer Applications, 2025, 45(8): 2421-2427.
|
| [7] |
Shuo ZHANG, Guokai SUN, Yuan ZHUANG, Xiaoyu FENG, Jingzhi WANG.
Dynamic detection method of eclipse attacks for blockchain node analysis
[J]. Journal of Computer Applications, 2025, 45(8): 2428-2436.
|
| [8] |
Di WANG.
P-Dledger: blockchain edge node security architecture
[J]. Journal of Computer Applications, 2025, 45(8): 2630-2636.
|
| [9] |
Yu WANG, Minghui ZHENG, Jingyi YANG, Shicheng HUANG.
Certificateless ring signature scheme based on SM2
[J]. Journal of Computer Applications, 2025, 45(8): 2437-2441.
|
| [10] |
Yuxuan CHEN, Haibin ZHENG, Zhenyu GUAN, Boheng SU, Yujue WANG, Zhenwei GUO.
Blockchain sharding mechanism in asynchronous network based on HoneyBadgerBFT and DAG
[J]. Journal of Computer Applications, 2025, 45(7): 2092-2100.
|
| [11] |
Li’e WANG, Caiyi LIN, Yongdong LI, Xingcheng FU, Xianxian LI.
Digital content copyright protection and fair tracking scheme based on blockchain
[J]. Journal of Computer Applications, 2025, 45(6): 1756-1765.
|
| [12] |
Yueduan XU, Jianwei CHEN, Hengliang ZHU.
Conditional privacy-preserving authentication scheme based on certificateless group signature for VANET
[J]. Journal of Computer Applications, 2025, 45(5): 1556-1563.
|
| [13] |
Gaimei GAO, Miaolian DU, Chunxia LIU, Yuli YANG, Weichao DANG, Guoxia DI.
Privacy protection method for consortium blockchain based on SM2 linkable ring signature
[J]. Journal of Computer Applications, 2025, 45(5): 1564-1572.
|
| [14] |
Xiaojun ZHANG, Yunpu HAO, Lei LI, Chenyang LI, Ziyu ZHOU.
Data tamper-proof batch auditing scheme based on industrial cloud storage systems
[J]. Journal of Computer Applications, 2025, 45(3): 891-895.
|
| [15] |
Yilin CHEN, Xiaoyu LI.
Blockchain coin mixing scheme based on one-time ring signature
[J]. Journal of Computer Applications, 2025, 45(12): 3881-3887.
|