[1] |
WANG Tengfei, CAI Manchun, YUE Ting, LU Tianliang.
Tor Anonymous Traffic Identification Based on Histogram-XGBoost
[J]. Computer Engineering and Applications, 2021, 57(14): 110-115.
|
[2] |
CHEN Hong, ZHU Yanan, XIAO Chenglong, JIN Haibo, ZHANG Zihao.
Publicly Verifiable Certificateless Multi-receiver Anonymous Signcryption
[J]. Computer Engineering and Applications, 2020, 56(19): 120-125.
|
[3] |
DONG Xuedong, HAN Shuo, ZHANG Cheng.
New Paillier Digital Signature Scheme Based on Cubic Residue
[J]. Computer Engineering and Applications, 2020, 56(18): 77-81.
|
[4] |
MA Yuanyuan, LIU Zhoubin, WANG Zixiang.
Research on Heterogeneous Terminal Security Access Technology in Edge Computing Scenario
[J]. Computer Engineering and Applications, 2020, 56(17): 115-120.
|
[5] |
WANG Shunye, LU Tianliang, DU Yanhui.
Audio and Video File Anonymous Communication System for Smart Home
[J]. Computer Engineering and Applications, 2020, 56(15): 101-105.
|
[6] |
XIAO Shuai, WANG Xu’an, PAN Feng.
Elliptic Curve Digital Signature Algorithm Without Modular Inverse Operation
[J]. Computer Engineering and Applications, 2020, 56(11): 118-123.
|
[7] |
ZHANG Ping, LI Yamin.
Forward Secure Elliptic Curve Digital Signature Scheme
[J]. Computer Engineering and Applications, 2020, 56(1): 115-120.
|
[8] |
WANG Kai, CHEN Liyun, LI Haopeng.
Website Fingerprinting Attack Method Against SSH Anonymous Traffic
[J]. Computer Engineering and Applications, 2019, 55(21): 99-103.
|
[9] |
SUN Dandan1,2, LUO Yonglong1,2, FAN Guoting1,2, GUO Liangmin1,2, ZHENG Xiaoyao1,2.
Location privacy-preserving method against attacks under P2P communication
[J]. Computer Engineering and Applications, 2018, 54(9): 75-83.
|
[10] |
GE Lixia1, LI Xiao1, HE Mingxing2, LI Yarong1, LIU Xiaojian2.
Improved certificateless proxy signature scheme
[J]. Computer Engineering and Applications, 2017, 53(8): 92-94.
|
[11] |
ZHANG Weizhe, GAO Dezhi, LI Yan.
Hidden identity ring signature scheme using ECC
[J]. Computer Engineering and Applications, 2017, 53(23): 88-90.
|
[12] |
MU Liang, CHENG Lianglun.
Adaptive learning model based on k-anonymity location privacy protection
[J]. Computer Engineering and Applications, 2017, 53(18): 89-94.
|
[13] |
TIAN Juanhong, ZHANG Jianzhong, LI Yanping.
Robust multi-proxy multi-blind signature scheme
[J]. Computer Engineering and Applications, 2017, 53(1): 130-133.
|
[14] |
ZOU Changzhi.
Identity-based multi-proxy signature without bilinear pairings
[J]. Computer Engineering and Applications, 2016, 52(9): 96-101.
|
[15] |
MI Junli1, ZHANG Jianzhong2, CHEN Shouting1, LIU Fenghua1.
Leakage-resilient designated verifier blind proxy signature scheme
[J]. Computer Engineering and Applications, 2016, 52(22): 123-126.
|