[1] |
WEI Jin1, LI Hui2, FANG Minglei3.
Design of Network-Targeted W-State Double-Server Blind Quantum Computation Protocols
[J]. Computer Engineering and Applications, 2019, 55(6): 67-72.
|
[2] |
SONG Xiuli1,2, XU Jiankun1,2.
(t,n) Threshold Quantum Secret Sharing Based on d-Dimensional Multi-Particle Entanglement State
[J]. Computer Engineering and Applications, 2019, 55(5): 89-95.
|
[3] |
XIAO Meihua, LI Wei, LI Yanan, MEI Yingtian.
Security communication framework of DICOM protocol based on PACS cloud
[J]. Computer Engineering and Applications, 2018, 54(7): 107-113.
|
[4] |
HE Yefeng.
Quantum key agreement protocols immune to collective noise
[J]. Computer Engineering and Applications, 2018, 54(10): 26-30.
|
[5] |
KONG Xiaoqin, LI Qin, LI Yuanke, LIU Wu .
Simulation of quantum key distribution based on quantum entangled states
[J]. Computer Engineering and Applications, 2017, 53(1): 113-117.
|
[6] |
ZHANG Gang, SHI Runhua, ZHONG Hong.
Anonymous authentication scheme based on identity in VANET
[J]. Computer Engineering and Applications, 2016, 52(17): 101-106.
|
[7] |
DENG Fei1, ZHU Ying2.
Mutual password-based client/server authentication protocol
[J]. Computer Engineering and Applications, 2015, 51(20): 72-76.
|
[8] |
ZHANG Xiao-hong1,2,FAN Zhong-kui1,ZHONG Xiao-yong3.
Double identity authentication system of one-time pad based on Schnorr protocol
[J]. Computer Engineering and Applications, 2010, 46(19): 81-84.
|
[9] |
MA Yu-chi,ZHAO Yuan,DENG Yi-qun,LI Yi-fa.
Trusted computing platform login authentication scheme based on CPK
[J]. Computer Engineering and Applications, 2010, 46(1): 90-94.
|
[10] |
LV Xin1,MA Zhi2,ZHONG Shu-qin2.
Research progresses of quantum cryptography theory
[J]. Computer Engineering and Applications, 2009, 45(23): 28-32.
|
[11] |
MA Hong-yang1,2,WANG Shu-mei1,LI Ran1.
Controllable quantum secret sharing scheme on three-party entangled state
[J]. Computer Engineering and Applications, 2009, 45(12): 81-82.
|
[12] |
PAN Lin,WANG Xiao-zhen,LIU Bao-xu.
Ukey device driver design and realization based on EFI BIOS
[J]. Computer Engineering and Applications, 2008, 44(34): 69-71.
|
[13] |
ZHANG Yi2,CUI Tian-xi1,2,TANG Hong1,2.
Mutual authentication in GSM based on Elliptic Curve Cryptography and combined public key technology
[J]. Computer Engineering and Applications, 2008, 44(19): 109-111.
|
[14] |
HE Cheng-yong,LI Fang-wei.
Identity authentication scheme for Ad Hoc network without trusted party
[J]. Computer Engineering and Applications, 2008, 44(15): 92-93.
|
[15] |
ZHANG Jie,WU Zhen-qiang,HUO Cheng-yi,JIAN Xiao-chun.
Anonymity authentication protocol in mobile Internet
[J]. Computer Engineering and Applications, 2008, 44(13): 80-83.
|