[1] |
CHENG Yage, HU Mingsheng, GONG Bei, WANG Lipeng, XU Erfeng.
Dynamic Threshold Signature Scheme with Strong Forward Security
[J]. Computer Engineering and Applications, 2020, 56(5): 125-134.
|
[2] |
HAN Bang, LI Zichen, TANG Yongli.
Design and Implementation of Full Text Retrieval Scheme Based on Homomorphic Encryption
[J]. Computer Engineering and Applications, 2020, 56(21): 103-107.
|
[3] |
YE Qing, YANG Xiaomeng, QIN Panke, ZHAO Zongqu, TANG Yongli.
Novel Against Quantum Attacks Group Signature Scheme Based on NTRU Lattice
[J]. Computer Engineering and Applications, 2020, 56(2): 89-96.
|
[4] |
ZHAI Sheping, CHEN Siji, WANG Yijing.
Research on Digital Copyright Storage System Model Based on Blockchain
[J]. Computer Engineering and Applications, 2020, 56(19): 13-21.
|
[5] |
DONG Xuedong, HAN Shuo, ZHANG Cheng.
New Paillier Digital Signature Scheme Based on Cubic Residue
[J]. Computer Engineering and Applications, 2020, 56(18): 77-81.
|
[6] |
XIAO Shuai, WANG Xu’an, PAN Feng.
Elliptic Curve Digital Signature Algorithm Without Modular Inverse Operation
[J]. Computer Engineering and Applications, 2020, 56(11): 118-123.
|
[7] |
ZHANG Ping, LI Yamin.
Forward Secure Elliptic Curve Digital Signature Scheme
[J]. Computer Engineering and Applications, 2020, 56(1): 115-120.
|
[8] |
YE Xuemei1,2, MAO Xuemin1,2, XIA Jinchun1,2, WANG Bo1,2.
Improved Approach to TF-IDF Algorithm in Text Classification
[J]. Computer Engineering and Applications, 2019, 55(2): 104-109.
|
[9] |
WANG Fei, CHEN Ming.
Identity-Based Multi-Proxy Multi-Signature Scheme in Standard Model
[J]. Computer Engineering and Applications, 2019, 55(18): 67-74.
|
[10] |
JIA Haoli, CHENG Yongqiang, LI Zhilei.
Off-Line Signature Verification for Interval Fuzzy Similarity Measure
[J]. Computer Engineering and Applications, 2019, 55(18): 122-126.
|
[11] |
WEI Jiamin1, FENG Jun1, BU Qirong1, GAO Yuan2, ZHAO Yan1.
Off-line Chinese handwriting signature verification with hierarchical classification
[J]. Computer Engineering and Applications, 2018, 54(8): 112-118.
|
[12] |
XU Yong1, LIU Fen2.
Research of scheme for preventing man-in-middle attack in heterogeneous sensor networks
[J]. Computer Engineering and Applications, 2018, 54(22): 99-106.
|
[13] |
XIANG Guangli, LI Ankang, LIN Xiang, XIONG Bin.
Multiple keywords retrieval scheme based on homomorphic encryption
[J]. Computer Engineering and Applications, 2018, 54(2): 97-101.
|
[14] |
WANG Shuo1, CHENG Xiangguo1, CHEN Yameng2, WANG Yue1.
ID-based key-insulated group signature scheme
[J]. Computer Engineering and Applications, 2018, 54(16): 76-80.
|
[15] |
SU Di, LIU Zhusong.
New type of Merkle Hash Tree for integrity audit scheme in cloud storage
[J]. Computer Engineering and Applications, 2018, 54(1): 70-76.
|