[1] |
CHENG Yage, HU Mingsheng, GONG Bei, WANG Lipeng, XU Erfeng.
Dynamic Threshold Signature Scheme with Strong Forward Security
[J]. Computer Engineering and Applications, 2020, 56(5): 125-134.
|
[2] |
YU Lianglong, DU Weizhang.
Secret Sharing Scheme Based on Symmetric Bivariate Polynomial
[J]. Computer Engineering and Applications, 2020, 56(13): 120-123.
|
[3] |
LIU Haifeng, XUE Chao, LIANG Xingliang.
Threshold Scheme Based on Bivariate Lagrange Interpolation Polynomial
[J]. Computer Engineering and Applications, 2019, 55(17): 107-111.
|
[4] |
ZHANG Benhui1, TANG Yuansheng2.
Two perfect threshold changeable multi-secret sharing schemes
[J]. Computer Engineering and Applications, 2017, 53(5): 24-27.
|
[5] |
TIAN Juanhong, ZHANG Jianzhong, LI Yanping.
Robust multi-proxy multi-blind signature scheme
[J]. Computer Engineering and Applications, 2017, 53(1): 130-133.
|
[6] |
ZOU Changzhi.
Identity-based multi-proxy signature without bilinear pairings
[J]. Computer Engineering and Applications, 2016, 52(9): 96-101.
|
[7] |
CHEN Jinguang1,2, SUN Rui1, MA Lili1.
Post-processing algorithm for GM-CPHD filter based on track-estimate association
[J]. Computer Engineering and Applications, 2015, 51(8): 189-194.
|
[8] |
PI Lan1,2, WU Chuankun1.
Improved remote asynchronous authentication scheme with smart card
[J]. Computer Engineering and Applications, 2014, 50(8): 61-65.
|
[9] |
ZHANG Yong, ZHANG Huan.
Secret sharing scheme based on elliptic curve
[J]. Computer Engineering and Applications, 2014, 50(8): 90-92.
|
[10] |
LI Huige, ZHANG Jianzhong.
New certificateless signcryption scheme
[J]. Computer Engineering and Applications, 2014, 50(5): 86-89.
|
[11] |
ZHANG Yichen, JIANG Yong, LI Jiguo.
Provably secure directed transitive signature
[J]. Computer Engineering and Applications, 2014, 50(19): 74-77.
|
[12] |
GUO Shuai1, XIE Shucui2.
Secret sharing scheme based on elliptic curves
[J]. Computer Engineering and Applications, 2013, 49(6): 97-99.
|
[13] |
ZHANG Jianzhong, XIE Junqin.
Improved threshold signature scheme for resisting conspiracy attack
[J]. Computer Engineering and Applications, 2013, 49(18): 52-55.
|
[14] |
XU Taiping, CHEN Yong.
Threshold hybrid proxy multi-signature scheme against conspiracy attack
[J]. Computer Engineering and Applications, 2013, 49(14): 73-76.
|
[15] |
WU Xingxing, LI Zhihui, LI Jing.
Threshold verifiable multi-secret sharing scheme
[J]. Computer Engineering and Applications, 2013, 49(13): 65-67.
|