[1] |
LI Tianming, YAN Xiang, ZHANG Zengnian, TIAN Yang, WU Xin, LI Chaoqun.
Application Research of Blockchain + Internet of Things in Agricultural Product Traceability
[J]. Computer Engineering and Applications, 2021, 57(23): 50-60.
|
[2] |
CHEN Fei, YE Chunming, CHEN Tao.
Design of Food Traceability System Based on Blockchain
[J]. Computer Engineering and Applications, 2021, 57(2): 60-69.
|
[3] |
YU Zhong, GUO Chang, XIE Yongbin, XUE Dong.
Research on Medical Anti-Counterfeiting Traceability System Based on Blockchain
[J]. Computer Engineering and Applications, 2020, 56(3): 35-41.
|
[4] |
LI Baodong, YE Chunming.
Product Traceability System of Automobile Supply Chain Based on Block Chain
[J]. Computer Engineering and Applications, 2020, 56(24): 35-42.
|
[5] |
ZHANG Siliang, LING Jie, CHEN Jiahui.
Traceable Blockchain Ledger Privacy Protection Scheme
[J]. Computer Engineering and Applications, 2020, 56(23): 31-37.
|
[6] |
GE Lixia1, LI Xiao1, HE Mingxing2, LI Yarong1, LIU Xiaojian2.
Improved certificateless proxy signature scheme
[J]. Computer Engineering and Applications, 2017, 53(8): 92-94.
|
[7] |
ZHOU Ping1,2, ZHANG Wei2, ZHANG Wenfang1.
Efficient multi-policy safe authentication scheme for virtual enterprises
[J]. Computer Engineering and Applications, 2017, 53(23): 91-96.
|
[8] |
TIAN Juanhong, ZHANG Jianzhong, LI Yanping.
Robust multi-proxy multi-blind signature scheme
[J]. Computer Engineering and Applications, 2017, 53(1): 130-133.
|
[9] |
ZOU Changzhi.
Identity-based multi-proxy signature without bilinear pairings
[J]. Computer Engineering and Applications, 2016, 52(9): 96-101.
|
[10] |
MI Junli1, ZHANG Jianzhong2, CHEN Shouting1, LIU Fenghua1.
Leakage-resilient designated verifier blind proxy signature scheme
[J]. Computer Engineering and Applications, 2016, 52(22): 123-126.
|
[11] |
LI Yarong1, LI Xiao1, HE Mingxing2, LIU Xiaojian2, GE Lixia1.
Security analysis and improvement of forward secure proxy signature scheme
[J]. Computer Engineering and Applications, 2016, 52(14): 110-114.
|
[12] |
CAO Xin, WEI Shimin, ZHUO Zepeng.
Security analysis of three forward secure proxy signature schemes
[J]. Computer Engineering and Applications, 2015, 51(7): 98-100.
|
[13] |
YU Jing1, LI Zhihui2.
Threshold proxy multi-signature scheme
[J]. Computer Engineering and Applications, 2015, 51(6): 69-71.
|
[14] |
DONG Hanfang1, WU Xiaojun1, WU Linhai2,3.
Research of willingness to pay for food traceability property based on clustering
[J]. Computer Engineering and Applications, 2015, 51(24): 221-226.
|
[15] |
HE Bin, DU Weizhang.
Analysis and improvement of forward secure proxy blind signature scheme
[J]. Computer Engineering and Applications, 2015, 51(18): 104-108.
|