[1] |
CHENG Yage, HU Mingsheng, GONG Bei, WANG Lipeng, XU Erfeng.
Dynamic Threshold Signature Scheme with Strong Forward Security
[J]. Computer Engineering and Applications, 2020, 56(5): 125-134.
|
[2] |
YE Qing, YANG Xiaomeng, QIN Panke, ZHAO Zongqu, TANG Yongli.
Novel Against Quantum Attacks Group Signature Scheme Based on NTRU Lattice
[J]. Computer Engineering and Applications, 2020, 56(2): 89-96.
|
[3] |
ZHAI Sheping, CHEN Siji, WANG Yijing.
Research on Digital Copyright Storage System Model Based on Blockchain
[J]. Computer Engineering and Applications, 2020, 56(19): 13-21.
|
[4] |
DONG Xuedong, HAN Shuo, ZHANG Cheng.
New Paillier Digital Signature Scheme Based on Cubic Residue
[J]. Computer Engineering and Applications, 2020, 56(18): 77-81.
|
[5] |
XIAO Shuai, WANG Xu’an, PAN Feng.
Elliptic Curve Digital Signature Algorithm Without Modular Inverse Operation
[J]. Computer Engineering and Applications, 2020, 56(11): 118-123.
|
[6] |
ZHANG Ping, LI Yamin.
Forward Secure Elliptic Curve Digital Signature Scheme
[J]. Computer Engineering and Applications, 2020, 56(1): 115-120.
|
[7] |
WANG Fei, CHEN Ming.
Identity-Based Multi-Proxy Multi-Signature Scheme in Standard Model
[J]. Computer Engineering and Applications, 2019, 55(18): 67-74.
|
[8] |
JIA Haoli, CHENG Yongqiang, LI Zhilei.
Off-Line Signature Verification for Interval Fuzzy Similarity Measure
[J]. Computer Engineering and Applications, 2019, 55(18): 122-126.
|
[9] |
WEI Jiamin1, FENG Jun1, BU Qirong1, GAO Yuan2, ZHAO Yan1.
Off-line Chinese handwriting signature verification with hierarchical classification
[J]. Computer Engineering and Applications, 2018, 54(8): 112-118.
|
[10] |
XU Yong1, LIU Fen2.
Research of scheme for preventing man-in-middle attack in heterogeneous sensor networks
[J]. Computer Engineering and Applications, 2018, 54(22): 99-106.
|
[11] |
WANG Shuo1, CHENG Xiangguo1, CHEN Yameng2, WANG Yue1.
ID-based key-insulated group signature scheme
[J]. Computer Engineering and Applications, 2018, 54(16): 76-80.
|
[12] |
GE Lixia1, LI Xiao1, HE Mingxing2, LI Yarong1, LIU Xiaojian2.
Improved certificateless proxy signature scheme
[J]. Computer Engineering and Applications, 2017, 53(8): 92-94.
|
[13] |
CAO Hao1, ZHUO Zepeng2 .
Recursive construction of balanced Boolean function with optimum algebraic immunity
[J]. Computer Engineering and Applications, 2017, 53(7): 133-135.
|
[14] |
WU Fan, MIN Huasong.
Real-time 3D semantic map generation method
[J]. Computer Engineering and Applications, 2017, 53(6): 67-72.
|
[15] |
ZHANG Weizhe, GAO Dezhi, LI Yan.
Hidden identity ring signature scheme using ECC
[J]. Computer Engineering and Applications, 2017, 53(23): 88-90.
|