[1] |
TONG Le, HAO Rong, YU Jia.
Secure Outsourcing Scheme for Bilinear Pairing Based on Single Untrusted Server
[J]. Computer Engineering and Applications, 2020, 56(9): 131-135.
|
[2] |
LI Yanjun, WANG Shubei, YANG Xiaotong, CAO Yisen.
Lightweight NFC Security Authentication Scheme Based on Mobile Terminal
[J]. Computer Engineering and Applications, 2020, 56(16): 84-89.
|
[3] |
WANG Shunye, LU Tianliang, DU Yanhui.
Audio and Video File Anonymous Communication System for Smart Home
[J]. Computer Engineering and Applications, 2020, 56(15): 101-105.
|
[4] |
WANG Kai, CHEN Liyun, LI Haopeng.
Website Fingerprinting Attack Method Against SSH Anonymous Traffic
[J]. Computer Engineering and Applications, 2019, 55(21): 99-103.
|
[5] |
SUN Ling1, LUO Changyuan2.
Secure Geographic Information Based Routing Protocol of Aeronautical Ad Hoc Networks
[J]. Computer Engineering and Applications, 2019, 55(12): 77-82.
|
[6] |
ZHENG Wenqing, JIN Hu, GUO Jianpeng, FENG Hui.
Backoff Algorithm for MAC Protocol Based on Channel Occupancy and Priority
[J]. Computer Engineering and Applications, 2019, 55(11): 80-84.
|
[7] |
WANG Jin, ZHANG Yonghui, GU Xiang.
Trust-aware privacy-preserving scheme for VANET
[J]. Computer Engineering and Applications, 2018, 54(6): 62-67.
|
[8] |
XU Hailin1, LU Yang2.
Searchable public key encryption secure against keyword guessing attacks
[J]. Computer Engineering and Applications, 2018, 54(24): 108-115.
|
[9] |
LIU Weilun, ZHANG Hengyang, ZHENG Bo, ZHAO Wei.
Statistical prediction mechanism for channel occupancy in airborne ad hoc network
[J]. Computer Engineering and Applications, 2018, 54(15): 78-83.
|
[10] |
WANG Jinru.
Wireless key generation algorithm for RFID system based on partial pseudonym ID
[J]. Computer Engineering and Applications, 2018, 54(1): 128-132.
|
[11] |
LIU Qilie, JIA Mengfang, CHEN Lin, FENG Zhiyu.
Routing protocol for urban vehicular ad hoc networks
[J]. Computer Engineering and Applications, 2017, 53(9): 121-126.
|
[12] |
GE Lixia1, LI Xiao1, HE Mingxing2, LI Yarong1, LIU Xiaojian2.
Improved certificateless proxy signature scheme
[J]. Computer Engineering and Applications, 2017, 53(8): 92-94.
|
[13] |
LIU Jiajia, LIU Jianhua.
Fuzzy attribute-based signcryption scheme with constant length ciphertext
[J]. Computer Engineering and Applications, 2017, 53(5): 128-133.
|
[14] |
LIU Lijun1,2, HUA Li1, ZHOU Aiping1.
Cognitive wireless Ad Hoc network routing algorithm based on interference constraints and energy-efficient
[J]. Computer Engineering and Applications, 2017, 53(17): 112-116.
|
[15] |
XU Hailin1, LU Yang2.
Efficient certificate-based proxy re-encryption scheme
[J]. Computer Engineering and Applications, 2017, 53(14): 80-86.
|