[1] |
CHEN Hong, LIU Yumeng, XIAO Chenglong, GUO Pengfei, XIAO Zhenjiu.
Improved RC4 Algorithm Based on BBS Generator and Elliptic Curve
[J]. Computer Engineering and Applications, 2020, 56(8): 87-95.
|
[2] |
DENG Xiaohong, ZHU Nianhong, HUANG Lei, WANG Zhiqiang, WANG Junbin.
Research on Identity Trusteeship Model Based on Blockchain
[J]. Computer Engineering and Applications, 2020, 56(4): 24-30.
|
[3] |
LI Yanjun, WANG Shubei, YANG Xiaotong, CAO Yisen.
Lightweight NFC Security Authentication Scheme Based on Mobile Terminal
[J]. Computer Engineering and Applications, 2020, 56(16): 84-89.
|
[4] |
XIAO Shuai, WANG Xu’an, PAN Feng.
Elliptic Curve Digital Signature Algorithm Without Modular Inverse Operation
[J]. Computer Engineering and Applications, 2020, 56(11): 118-123.
|
[5] |
ZHANG Ping, LI Yamin.
Forward Secure Elliptic Curve Digital Signature Scheme
[J]. Computer Engineering and Applications, 2020, 56(1): 115-120.
|
[6] |
SUN Ling1, LUO Changyuan2.
Secure Geographic Information Based Routing Protocol of Aeronautical Ad Hoc Networks
[J]. Computer Engineering and Applications, 2019, 55(12): 77-82.
|
[7] |
ZHENG Wenqing, JIN Hu, GUO Jianpeng, FENG Hui.
Backoff Algorithm for MAC Protocol Based on Channel Occupancy and Priority
[J]. Computer Engineering and Applications, 2019, 55(11): 80-84.
|
[8] |
XU Yong1, LIU Fen2.
Research of scheme for preventing man-in-middle attack in heterogeneous sensor networks
[J]. Computer Engineering and Applications, 2018, 54(22): 99-106.
|
[9] |
LIU Weilun, ZHANG Hengyang, ZHENG Bo, ZHAO Wei.
Statistical prediction mechanism for channel occupancy in airborne ad hoc network
[J]. Computer Engineering and Applications, 2018, 54(15): 78-83.
|
[10] |
LIU Qilie, JIA Mengfang, CHEN Lin, FENG Zhiyu.
Routing protocol for urban vehicular ad hoc networks
[J]. Computer Engineering and Applications, 2017, 53(9): 121-126.
|
[11] |
ZHANG Weizhe, GAO Dezhi, LI Yan.
Hidden identity ring signature scheme using ECC
[J]. Computer Engineering and Applications, 2017, 53(23): 88-90.
|
[12] |
LIU Lijun1,2, HUA Li1, ZHOU Aiping1.
Cognitive wireless Ad Hoc network routing algorithm based on interference constraints and energy-efficient
[J]. Computer Engineering and Applications, 2017, 53(17): 112-116.
|
[13] |
QIAO Ping’an, ZHOU Min, LIU Yunshuang.
Research of new clustering algorithm based on Ad Hoc networks
[J]. Computer Engineering and Applications, 2017, 53(13): 129-133.
|
[14] |
ZHANG Fei1, WEI Yingjun2.
Car Ad Hoc network communication protocol with multi-link sensing
[J]. Computer Engineering and Applications, 2016, 52(8): 102-105.
|
[15] |
LI Ming.
Novel two-party authenticated key agreement protocol in Wireless Sensor Network
[J]. Computer Engineering and Applications, 2016, 52(3): 100-102.
|