[1] |
CHEN Hong, ZHU Yanan, XIAO Chenglong, JIN Haibo, ZHANG Zihao.
Publicly Verifiable Certificateless Multi-receiver Anonymous Signcryption
[J]. Computer Engineering and Applications, 2020, 56(19): 120-125.
|
[2] |
YU Lianglong, DU Weizhang.
Secret Sharing Scheme Based on Symmetric Bivariate Polynomial
[J]. Computer Engineering and Applications, 2020, 56(13): 120-123.
|
[3] |
LI Chenyi1, ZHANG Yulei1, ZHANG Yongjie2, WANG Caifen1.
Efficient TPKC→IDPKC heterogeneous signcryption scheme
[J]. Computer Engineering and Applications, 2018, 54(2): 125-130.
|
[4] |
ZHANG Weizhe, GAO Dezhi, LI Yan.
Hidden identity ring signature scheme using ECC
[J]. Computer Engineering and Applications, 2017, 53(23): 88-90.
|
[5] |
TIAN Juanhong, ZHANG Jianzhong, LI Yanping.
Robust multi-proxy multi-blind signature scheme
[J]. Computer Engineering and Applications, 2017, 53(1): 130-133.
|
[6] |
ZOU Changzhi.
Identity-based multi-proxy signature without bilinear pairings
[J]. Computer Engineering and Applications, 2016, 52(9): 96-101.
|
[7] |
ZHANG Jiao, HE Yong, LI Xiong.
Cryptanalysis and improvement of two verifiable ring signature schemes
[J]. Computer Engineering and Applications, 2016, 52(8): 115-119.
|
[8] |
HUANG Ping, YANG Xiaodong, WANG Caifen.
On-line/off-line signature scheme with strong unforgeability
[J]. Computer Engineering and Applications, 2016, 52(3): 81-84.
|
[9] |
YANG Qing1, XIN Xiaolong2.
Sequential and broadcasting blind multisignature scheme based on hyperelliptic curves
[J]. Computer Engineering and Applications, 2015, 51(2): 99-102.
|
[10] |
CHEN Ming.
Identity-based proxy blind signature scheme in standard model
[J]. Computer Engineering and Applications, 2015, 51(19): 103-109.
|
[11] |
HE Bin, DU Weizhang.
Analysis and improvement of forward secure proxy blind signature scheme
[J]. Computer Engineering and Applications, 2015, 51(18): 104-108.
|
[12] |
WU Qijia, ZHANG Jianzhong.
Blind signature scheme based on quantum secret sharing
[J]. Computer Engineering and Applications, 2015, 51(13): 63-65.
|
[13] |
PI Lan1,2, WU Chuankun1.
Improved remote asynchronous authentication scheme with smart card
[J]. Computer Engineering and Applications, 2014, 50(8): 61-65.
|
[14] |
ZHANG Yong, ZHANG Huan.
Secret sharing scheme based on elliptic curve
[J]. Computer Engineering and Applications, 2014, 50(8): 90-92.
|
[15] |
LI Huige, ZHANG Jianzhong.
New certificateless signcryption scheme
[J]. Computer Engineering and Applications, 2014, 50(5): 86-89.
|