[1] |
WANG Zhanjun, MA Haiying, WANG Jinhua, Li Yan.
Efficiently Revocable Identity-Based Online/Offline Encryption Scheme
[J]. Computer Engineering and Applications, 2020, 56(13): 114-119.
|
[2] |
NIU Shufen, YANG Xiyan, LI Zhenbin, WANG Caifen.
Hybrid Signcryption Scheme Based on Heterogeneous System
[J]. Computer Engineering and Applications, 2019, 55(3): 61-67.
|
[3] |
YU Qihong, LI Jiguo.
Survey of Leakage-Resilient Encryption
[J]. Computer Engineering and Applications, 2019, 55(21): 18-25.
|
[4] |
WANG Fei, CHEN Ming.
Identity-Based Multi-Proxy Multi-Signature Scheme in Standard Model
[J]. Computer Engineering and Applications, 2019, 55(18): 67-74.
|
[5] |
WANG Zhanjun1, MA Haiying2,3, WANG Jinhua1.
identity-based lightweight encryption scheme in mobile cloud computing
[J]. Computer Engineering and Applications, 2018, 54(19): 72-76.
|
[6] |
LIU Jiajia, LIU Jianhua.
Fuzzy attribute-based signcryption scheme with constant length ciphertext
[J]. Computer Engineering and Applications, 2017, 53(5): 128-133.
|
[7] |
ZHANG Min, DU Weizhang.
Publicly verifiable and renewable multi-secret sharing scheme with self-selecting sub-secret
[J]. Computer Engineering and Applications, 2016, 52(9): 71-77.
|
[8] |
ZOU Changzhi.
Identity-based multi-proxy signature without bilinear pairings
[J]. Computer Engineering and Applications, 2016, 52(9): 96-101.
|
[9] |
ZHANG Jiao, HE Yong, LI Xiong.
Cryptanalysis and improvement of two verifiable ring signature schemes
[J]. Computer Engineering and Applications, 2016, 52(8): 115-119.
|
[10] |
ZHANG Zhiming, LI Ping, XIONG Xiaoyong.
Efficient false data filtering scheme for wireless sensor networks
[J]. Computer Engineering and Applications, 2015, 51(24): 78-85.
|
[11] |
CHEN Ming.
Identity-based proxy blind signature scheme in standard model
[J]. Computer Engineering and Applications, 2015, 51(19): 103-109.
|
[12] |
ZHANG Jianzhong, YANG Li.
Cryptography analysis and improvement on certificateless proxy blind signature scheme
[J]. Computer Engineering and Applications, 2014, 50(4): 90-93.
|
[13] |
CHEN Yangrong, XING Guanglin.
Research on privacy protection mechanism in distributed online social networks
[J]. Computer Engineering and Applications, 2014, 50(22): 118-121.
|
[14] |
JIA Zongpu, LI He, SONG Cheng, ZHANG Xiaohong.
Efficient certificateless tripartite key agreement protocol
[J]. Computer Engineering and Applications, 2014, 50(10): 105-107.
|
[15] |
HUANG Rufen, NONG Qiang, HUANG Zhenjie.
Efficient provably secure certificate-based signature scheme
[J]. Computer Engineering and Applications, 2013, 49(24): 55-60.
|