[1] |
TAN Lijuan, ZHENG Wei, LIU Youlin, FAN Xin, YANG Fengyu.
Survey of Airborne Software Test and Verification Methods for Airworthiness Standards
[J]. Computer Engineering and Applications, 2021, 57(15): 9-22.
|
[2] |
CHENG Yage, HU Mingsheng, GONG Bei, WANG Lipeng, XU Erfeng.
Dynamic Threshold Signature Scheme with Strong Forward Security
[J]. Computer Engineering and Applications, 2020, 56(5): 125-134.
|
[3] |
XIAO Shuai, WANG Xu’an, PAN Feng.
Elliptic Curve Digital Signature Algorithm Without Modular Inverse Operation
[J]. Computer Engineering and Applications, 2020, 56(11): 118-123.
|
[4] |
ZHANG Yupeng1, WEN Mi2.
Design of dual authentication algorithm for Modbus protocol
[J]. Computer Engineering and Applications, 2018, 54(20): 93-98.
|
[5] |
GE Lixia1, LI Xiao1, HE Mingxing2, LI Yarong1, LIU Xiaojian2.
Improved certificateless proxy signature scheme
[J]. Computer Engineering and Applications, 2017, 53(8): 92-94.
|
[6] |
TIAN Juanhong, ZHANG Jianzhong, LI Yanping.
Robust multi-proxy multi-blind signature scheme
[J]. Computer Engineering and Applications, 2017, 53(1): 130-133.
|
[7] |
ZOU Changzhi.
Identity-based multi-proxy signature without bilinear pairings
[J]. Computer Engineering and Applications, 2016, 52(9): 96-101.
|
[8] |
MI Junli1, ZHANG Jianzhong2, CHEN Shouting1, LIU Fenghua1.
Leakage-resilient designated verifier blind proxy signature scheme
[J]. Computer Engineering and Applications, 2016, 52(22): 123-126.
|
[9] |
YU Chunwu, GUO Longfei, ZHANG Jian.
HBL: lightweight Hash function
[J]. Computer Engineering and Applications, 2016, 52(20): 1-4.
|
[10] |
LI Yarong1, LI Xiao1, HE Mingxing2, LIU Xiaojian2, GE Lixia1.
Security analysis and improvement of forward secure proxy signature scheme
[J]. Computer Engineering and Applications, 2016, 52(14): 110-114.
|
[11] |
CAO Xin, WEI Shimin, ZHUO Zepeng.
Security analysis of three forward secure proxy signature schemes
[J]. Computer Engineering and Applications, 2015, 51(7): 98-100.
|
[12] |
YU Jing1, LI Zhihui2.
Threshold proxy multi-signature scheme
[J]. Computer Engineering and Applications, 2015, 51(6): 69-71.
|
[13] |
LIU Xiaohong, ZHANG Jianzhong.
Analysis and improvement of certificateless proxy signature scheme
[J]. Computer Engineering and Applications, 2014, 50(22): 115-117.
|
[14] |
ZHANG Wei1, DONG Qunfeng2.
Design and implementation of cloud security comprehensive analysis system
[J]. Computer Engineering and Applications, 2014, 50(19): 89-94.
|
[15] |
CHEN Lin.
Cryptanalysis and improvement for two certificateless proxy signature schemes
[J]. Computer Engineering and Applications, 2013, 49(7): 85-88.
|