[1] |
BAI Jianfeng, MIAO Fuyou.
Constructing Ideal [(t,k,n)] Tightly Coupled Secret Sharing Scheme
[J]. Computer Engineering and Applications, 2021, 57(3): 125-129.
|
[2] |
WEN Zeyu, XIE Jun, XIE Gang, XU Xinying.
Multi-objective Sparrow Search Algorithm Based on New Crowding Distance
[J]. Computer Engineering and Applications, 2021, 57(22): 102-109.
|
[3] |
CHENG Yage, HU Mingsheng, GONG Bei, WANG Lipeng, XU Erfeng.
Dynamic Threshold Signature Scheme with Strong Forward Security
[J]. Computer Engineering and Applications, 2020, 56(5): 125-134.
|
[4] |
YU Lianglong, DU Weizhang.
Secret Sharing Scheme Based on Symmetric Bivariate Polynomial
[J]. Computer Engineering and Applications, 2020, 56(13): 120-123.
|
[5] |
LIU Ying, LIU Qian, LI Daxiang, YANG Wenzong.
Cultural Relic Texture Mapping Algorithm Based on PTM Model
[J]. Computer Engineering and Applications, 2020, 56(12): 209-214.
|
[6] |
WANG Yejiao, ZHOU Yong.
Research on New Form of Legendre Moment
[J]. Computer Engineering and Applications, 2019, 55(22): 152-162.
|
[7] |
WANG Kai, ZHANG Guicang, SU Jinfeng.
Practical Method for Generating Trigonometric Polynomial Surfaces over Triangular Domains
[J]. Computer Engineering and Applications, 2019, 55(22): 195-200.
|
[8] |
LIU Haifeng, XUE Chao, LIANG Xingliang.
Threshold Scheme Based on Bivariate Lagrange Interpolation Polynomial
[J]. Computer Engineering and Applications, 2019, 55(17): 107-111.
|
[9] |
WANG Yanyan1, WANG Hongwei1,2.
Post-Partial Polynomial RBF Neural Network Algorithm Based on Particle Swarm Optimization
[J]. Computer Engineering and Applications, 2019, 55(12): 72-76.
|
[10] |
ZHU Shuqin, WANG Wenhong, LI Junqing.
Designing a class of quadratic polynomial chaotic maps and their pseudo random number generator
[J]. Computer Engineering and Applications, 2018, 54(9): 84-88.
|
[11] |
PENG Haiying, YANG Jian, SUN Lijun.
Method for constructing (3, L)-QC-LDPC codes based on Chinese Remainder Theorem
[J]. Computer Engineering and Applications, 2018, 54(5): 105-110.
|
[12] |
CHEN Siyong, AN Congpei.
l1-regularization approximation model and its application
[J]. Computer Engineering and Applications, 2018, 54(12): 35-40.
|
[13] |
FANG Liang1, LIU Fengnian2, MIAO Fuyou1.
Group key negotiate scheme based on secret sharing
[J]. Computer Engineering and Applications, 2018, 54(12): 69-73.
|
[14] |
ZHANG Benhui1, TANG Yuansheng2.
Two perfect threshold changeable multi-secret sharing schemes
[J]. Computer Engineering and Applications, 2017, 53(5): 24-27.
|
[15] |
LI Mengwan, SHA Xiuyan.
Application of improved GM(1,1) grey prediction model
[J]. Computer Engineering and Applications, 2016, 52(4): 24-30.
|