[1] |
CHENG Yage, HU Mingsheng, GONG Bei, WANG Lipeng, XU Erfeng.
Dynamic Threshold Signature Scheme with Strong Forward Security
[J]. Computer Engineering and Applications, 2020, 56(5): 125-134.
|
[2] |
YE Qing, YANG Xiaomeng, QIN Panke, ZHAO Zongqu, TANG Yongli.
Novel Against Quantum Attacks Group Signature Scheme Based on NTRU Lattice
[J]. Computer Engineering and Applications, 2020, 56(2): 89-96.
|
[3] |
HUANG Nana, SHEN Liang, YUANG Yuanyuan.
Research on Efficient and Secure Data Sharing Scheme in Personal Health Record on Cloud
[J]. Computer Engineering and Applications, 2020, 56(1): 92-97.
|
[4] |
ZHANG Ping, LI Yamin.
Forward Secure Elliptic Curve Digital Signature Scheme
[J]. Computer Engineering and Applications, 2020, 56(1): 115-120.
|
[5] |
ZHU Shuqin1, WANG Wenhong1, SUN Zhonggui2.
Security Analysis and Improvement of Chaotic Image Encryption Algorithm
[J]. Computer Engineering and Applications, 2019, 55(1): 115-122.
|
[6] |
WANG Shuo1, CHENG Xiangguo1, CHEN Yameng2, WANG Yue1.
ID-based key-insulated group signature scheme
[J]. Computer Engineering and Applications, 2018, 54(16): 76-80.
|
[7] |
CAO Xin, WEI Shimin, ZHUO Zepeng.
Security analysis of three forward secure proxy signature schemes
[J]. Computer Engineering and Applications, 2015, 51(7): 98-100.
|
[8] |
HE Bin, DU Weizhang.
Analysis and improvement of forward secure proxy blind signature scheme
[J]. Computer Engineering and Applications, 2015, 51(18): 104-108.
|
[9] |
GU Chunsheng1,2, JING Zhengjun1,3, YU Zhimin1.
Breaking faster fully homomorphic encryption scheme over integer
[J]. Computer Engineering and Applications, 2013, 49(21): 101-105.
|
[10] |
ZHANG Longxiang.
Cryptanalysis of key agreement protocol based on triangular matrix
[J]. Computer Engineering and Applications, 2013, 49(20): 68-70.
|
[11] |
LIU Xin1,2,3.
Member ID-based group signature with online extractors
[J]. Computer Engineering and Applications, 2013, 49(2): 113-118.
|
[12] |
ZHANG Kai, ZHANG Jianzhong.
Analysis and improvement of a group signature scheme
[J]. Computer Engineering and Applications, 2013, 49(19): 75-78.
|
[13] |
ZHOU Ping1,2, HE Dake1.
Proxy blind signature schemes with forward secure property
[J]. Computer Engineering and Applications, 2012, 48(5): 51-53.
|
[14] |
LIAO Xuefeng, ZOU Huasheng.
Analysis and improvement of hyperchaotic image encryption scheme
[J]. Computer Engineering and Applications, 2012, 48(33): 105-111.
|
[15] |
LI Haifeng1, LAN Caihui2, ZUO Weiping1, MA Haiyun1.
ID-based threshold group signature scheme without trusted party
[J]. Computer Engineering and Applications, 2012, 48(32): 89-93.
|