[1] |
LI Tianming, YAN Xiang, ZHANG Zengnian, TIAN Yang, WU Xin, LI Chaoqun.
Application Research of Blockchain + Internet of Things in Agricultural Product Traceability
[J]. Computer Engineering and Applications, 2021, 57(23): 50-60.
|
[2] |
CHEN Fei, YE Chunming, CHEN Tao.
Design of Food Traceability System Based on Blockchain
[J]. Computer Engineering and Applications, 2021, 57(2): 60-69.
|
[3] |
YU Zhong, GUO Chang, XIE Yongbin, XUE Dong.
Research on Medical Anti-Counterfeiting Traceability System Based on Blockchain
[J]. Computer Engineering and Applications, 2020, 56(3): 35-41.
|
[4] |
LI Baodong, YE Chunming.
Product Traceability System of Automobile Supply Chain Based on Block Chain
[J]. Computer Engineering and Applications, 2020, 56(24): 35-42.
|
[5] |
ZHANG Siliang, LING Jie, CHEN Jiahui.
Traceable Blockchain Ledger Privacy Protection Scheme
[J]. Computer Engineering and Applications, 2020, 56(23): 31-37.
|
[6] |
YE Qing, YANG Xiaomeng, QIN Panke, ZHAO Zongqu, TANG Yongli.
Novel Against Quantum Attacks Group Signature Scheme Based on NTRU Lattice
[J]. Computer Engineering and Applications, 2020, 56(2): 89-96.
|
[7] |
WANG Shuo1, CHENG Xiangguo1, CHEN Yameng2, WANG Yue1.
ID-based key-insulated group signature scheme
[J]. Computer Engineering and Applications, 2018, 54(16): 76-80.
|
[8] |
DONG Hanfang1, WU Xiaojun1, WU Linhai2,3.
Research of willingness to pay for food traceability property based on clustering
[J]. Computer Engineering and Applications, 2015, 51(24): 221-226.
|
[9] |
HE Bin, DU Weizhang.
Analysis and improvement of forward secure proxy blind signature scheme
[J]. Computer Engineering and Applications, 2015, 51(18): 104-108.
|
[10] |
YIN Fengmei1, PU Guangning2, ZHANG Jiang1, HOU Zhengfeng3.
Threshold anonymous authentication scheme based on linear equations
[J]. Computer Engineering and Applications, 2015, 51(1): 97-101.
|
[11] |
XU Yebing, LIU Chao.
Research on retrieval methods for traceability between Chinese documentation and source code based on LDA
[J]. Computer Engineering and Applications, 2013, 49(5): 70-76.
|
[12] |
LIU Xin1,2,3.
Member ID-based group signature with online extractors
[J]. Computer Engineering and Applications, 2013, 49(2): 113-118.
|
[13] |
ZHANG Kai, ZHANG Jianzhong.
Analysis and improvement of a group signature scheme
[J]. Computer Engineering and Applications, 2013, 49(19): 75-78.
|
[14] |
LI Haifeng1, LAN Caihui2, ZUO Weiping1, MA Haiyun1.
ID-based threshold group signature scheme without trusted party
[J]. Computer Engineering and Applications, 2012, 48(32): 89-93.
|
[15] |
YANG Changhai.
Cryptanalysis of threshold group signature scheme with multi-policy
[J]. Computer Engineering and Applications, 2011, 47(7): 107-109.
|