[1] |
Sheping ZHAI, Pengju ZHU, Rui YANG, Jiayiteng LIU.
Blockchain-based identity management system for internet of things
[J]. Journal of Computer Applications, 2025, 45(9): 2873-2881.
|
[2] |
Wei GAO, Lihua LIU, Bintao HE, Fang’an DENG.
Research advances in blockchain consensus mechanisms and improvement algorithms
[J]. Journal of Computer Applications, 2025, 45(9): 2848-2864.
|
[3] |
Wei SHE, Tianxiang MA, Haige FENG, Zhao TIAN, Wei LIU.
Blockchain covert communication method based on contract call concealment
[J]. Journal of Computer Applications, 2025, 45(9): 2865-2872.
|
[4] |
Yu WANG, Minghui ZHENG, Jingyi YANG, Shicheng HUANG.
Certificateless ring signature scheme based on SM2
[J]. Journal of Computer Applications, 2025, 45(8): 2437-2441.
|
[5] |
Yan YAN, Feifei LI, Yaqin LYU, Tao FENG.
Secure and efficient frequency estimation method based on shuffled differential privacy
[J]. Journal of Computer Applications, 2025, 45(8): 2600-2611.
|
[6] |
Haiyang PENG, Weixing JI, Fawang LIU.
Blockchain-based data notarization model for autonomous driving simulation testing
[J]. Journal of Computer Applications, 2025, 45(8): 2421-2427.
|
[7] |
Shuo ZHANG, Guokai SUN, Yuan ZHUANG, Xiaoyu FENG, Jingzhi WANG.
Dynamic detection method of eclipse attacks for blockchain node analysis
[J]. Journal of Computer Applications, 2025, 45(8): 2428-2436.
|
[8] |
Di WANG.
P-Dledger: blockchain edge node security architecture
[J]. Journal of Computer Applications, 2025, 45(8): 2630-2636.
|
[9] |
Yuxuan CHEN, Haibin ZHENG, Zhenyu GUAN, Boheng SU, Yujue WANG, Zhenwei GUO.
Blockchain sharding mechanism in asynchronous network based on HoneyBadgerBFT and DAG
[J]. Journal of Computer Applications, 2025, 45(7): 2092-2100.
|
[10] |
Li’e WANG, Caiyi LIN, Yongdong LI, Xingcheng FU, Xianxian LI.
Digital content copyright protection and fair tracking scheme based on blockchain
[J]. Journal of Computer Applications, 2025, 45(6): 1756-1765.
|
[11] |
Yueduan XU, Jianwei CHEN, Hengliang ZHU.
Conditional privacy-preserving authentication scheme based on certificateless group signature for VANET
[J]. Journal of Computer Applications, 2025, 45(5): 1556-1563.
|
[12] |
Gaimei GAO, Miaolian DU, Chunxia LIU, Yuli YANG, Weichao DANG, Guoxia DI.
Privacy protection method for consortium blockchain based on SM2 linkable ring signature
[J]. Journal of Computer Applications, 2025, 45(5): 1564-1572.
|
[13] |
Xiaojun ZHANG, Yunpu HAO, Lei LI, Chenyang LI, Ziyu ZHOU.
Data tamper-proof batch auditing scheme based on industrial cloud storage systems
[J]. Journal of Computer Applications, 2025, 45(3): 891-895.
|
[14] |
Chunxia LIU, Hanying XU, Gaimei GAO, Weichao DANG, Zilu LI.
Smart contract vulnerability detection method based on echo state network
[J]. Journal of Computer Applications, 2025, 45(1): 153-161.
|
[15] |
Min SUN, Shihang JIAO, Chenyan WANG.
Credit based committee consensus mechanism
[J]. Journal of Computer Applications, 2025, 45(1): 170-177.
|