[1] |
WANG Shuo1, CHENG Xiangguo1, CHEN Yameng2, WANG Yue1.
ID-based key-insulated group signature scheme
[J]. Computer Engineering and Applications, 2018, 54(16): 76-80.
|
[2] |
CHEN Haihong1, LI Junyi2.
Novel ID-based group authenticated key agreement scheme
[J]. Computer Engineering and Applications, 2017, 53(21): 103-109.
|
[3] |
YI Ting, DU Weizhang.
Forward secure threshold proxy signature scheme with designated verifier
[J]. Computer Engineering and Applications, 2017, 53(10): 101-106.
|
[4] |
AI Jiangshan1, ZHU Jian2.
Research on location problem of multiple SINK nodes based on GPMP in WSNs
[J]. Computer Engineering and Applications, 2016, 52(3): 85-90.
|
[5] |
LI Yarong1, LI Xiao1, HE Mingxing2, LIU Xiaojian2, GE Lixia1.
Security analysis and improvement of forward secure proxy signature scheme
[J]. Computer Engineering and Applications, 2016, 52(14): 110-114.
|
[6] |
YU Jing1, LI Zhihui2.
Threshold proxy multi-signature scheme
[J]. Computer Engineering and Applications, 2015, 51(6): 69-71.
|
[7] |
HE Bin, DU Weizhang.
Analysis and improvement of forward secure certificateless proxy blind signature scheme
[J]. Computer Engineering and Applications, 2013, 49(22): 104-109.
|
[8] |
LIU Xin1,2,3.
Member ID-based group signature with online extractors
[J]. Computer Engineering and Applications, 2013, 49(2): 113-118.
|
[9] |
XIANG Shunbo, KE Wende.
Efficient password-authenticated tripartite key exchange protocol
[J]. Computer Engineering and Applications, 2012, 48(16): 107-110.
|
[10] |
LU Haijun, XIE Qi.
Analysis and improvement of identity based aggregate signature scheme
[J]. Computer Engineering and Applications, 2012, 48(13): 75-78.
|
[11] |
YE Chunxiao, LUO Juan.
Grid-based Hybrid Particle Swarm Optimization algorithm for task allocation problem
[J]. Computer Engineering and Applications, 2012, 48(12): 34-37.
|
[12] |
HE Ling1,CAI Yichao1,YANG Zheng2.
Grid-based division approach for high-dimensional data space
[J]. Computer Engineering and Applications, 2011, 47(5): 152-153.
|
[13] |
LONG Xiao,WANG Jingcheng,ZHAO Guanglei,LUO Jian,ZHANG Qiuwen,ZHANG Zhenwei,HE Jun,ZHANG Mi.
Forward security research of key management scheme in wireless sensor networks
[J]. Computer Engineering and Applications, 2011, 47(25): 68-70.
|
[14] |
JIANG Hanzhi.
ID-based aggregate signature scheme without trusted PKG
[J]. Computer Engineering and Applications, 2011, 47(16): 104-107.
|
[15] |
WAN Shichang,CHENG Lihong,ZHANG Zhen.
Forward secure hybrid proxy multi-signature scheme
[J]. Computer Engineering and Applications, 2011, 47(12): 80-83.
|