[1] |
TONG Le, HAO Rong, YU Jia.
Secure Outsourcing Scheme for Bilinear Pairing Based on Single Untrusted Server
[J]. Computer Engineering and Applications, 2020, 56(9): 131-135.
|
[2] |
CHEN Hong, ZHU Yanan, XIAO Chenglong, JIN Haibo, ZHANG Zihao.
Publicly Verifiable Certificateless Multi-receiver Anonymous Signcryption
[J]. Computer Engineering and Applications, 2020, 56(19): 120-125.
|
[3] |
LI Yanjun, WANG Shubei, YANG Xiaotong, CAO Yisen.
Lightweight NFC Security Authentication Scheme Based on Mobile Terminal
[J]. Computer Engineering and Applications, 2020, 56(16): 84-89.
|
[4] |
NIU Shufen, YANG Xiyan, LI Zhenbin, WANG Caifen.
Hybrid Signcryption Scheme Based on Heterogeneous System
[J]. Computer Engineering and Applications, 2019, 55(3): 61-67.
|
[5] |
XU Hailin1, LU Yang2.
Searchable public key encryption secure against keyword guessing attacks
[J]. Computer Engineering and Applications, 2018, 54(24): 108-115.
|
[6] |
LI Chenyi1, ZHANG Yulei1, ZHANG Yongjie2, WANG Caifen1.
Efficient TPKC→IDPKC heterogeneous signcryption scheme
[J]. Computer Engineering and Applications, 2018, 54(2): 125-130.
|
[7] |
LI Yarong1,LI Xiao1,GE Lixia1,HE Mingxing2.
Improved multi-message and multi-receiver hybrid signcryption scheme
[J]. Computer Engineering and Applications, 2018, 54(19): 77-81.
|
[8] |
GE Lixia1, LI Xiao1, HE Mingxing2, LI Yarong1, LIU Xiaojian2.
Improved certificateless proxy signature scheme
[J]. Computer Engineering and Applications, 2017, 53(8): 92-94.
|
[9] |
LIU Jiajia, LIU Jianhua.
Fuzzy attribute-based signcryption scheme with constant length ciphertext
[J]. Computer Engineering and Applications, 2017, 53(5): 128-133.
|
[10] |
ZHANG Weizhe, GAO Dezhi, LI Yan.
Hidden identity ring signature scheme using ECC
[J]. Computer Engineering and Applications, 2017, 53(23): 88-90.
|
[11] |
XU Hailin1, LU Yang2.
Efficient certificate-based proxy re-encryption scheme
[J]. Computer Engineering and Applications, 2017, 53(14): 80-86.
|
[12] |
ZHANG Min, DU Weizhang.
Publicly verifiable and renewable multi-secret sharing scheme with self-selecting sub-secret
[J]. Computer Engineering and Applications, 2016, 52(9): 71-77.
|
[13] |
ZHANG Jiao, HE Yong, LI Xiong.
Cryptanalysis and improvement of two verifiable ring signature schemes
[J]. Computer Engineering and Applications, 2016, 52(8): 115-119.
|
[14] |
HUANG Ping, YANG Xiaodong, WANG Caifen.
On-line/off-line signature scheme with strong unforgeability
[J]. Computer Engineering and Applications, 2016, 52(3): 81-84.
|
[15] |
ZHANG Min, DU Weizhang.
Publicly verifiable and periodically renewable multi-secret sharing scheme
[J]. Computer Engineering and Applications, 2016, 52(2): 117-126.
|