[1] |
TONG Wenlin, CHEN Dewang, HUANG Yunhu, LYU Yisheng.
Fuzzy System Optimization Method Based on Simulated Annealing and Rule Reduction
[J]. Computer Engineering and Applications, 2021, 57(16): 142-150.
|
[2] |
CHEN Hong, ZHU Yanan, XIAO Chenglong, JIN Haibo, ZHANG Zihao.
Publicly Verifiable Certificateless Multi-receiver Anonymous Signcryption
[J]. Computer Engineering and Applications, 2020, 56(19): 120-125.
|
[3] |
LIU Shuyi, ZHAI Ye, LIU Dongsheng.
Cross-Project Software Defect Prediction Based on Multi-Strategy Feature Filtering
[J]. Computer Engineering and Applications, 2019, 55(8): 53-58.
|
[4] |
NIU Shufen, YANG Xiyan, LI Zhenbin, WANG Caifen.
Hybrid Signcryption Scheme Based on Heterogeneous System
[J]. Computer Engineering and Applications, 2019, 55(3): 61-67.
|
[5] |
LI Lei, XU Chungen, XU Lei, ZHAO Zemao.
Research on Electronic Medical Record Data Management in Cloud Environment
[J]. Computer Engineering and Applications, 2019, 55(15): 135-140.
|
[6] |
LI Xiaowen, LI Yangyang, LEI Xiu.
Research and Implementation of Authentication and Key Agreement Process in 5G Client
[J]. Computer Engineering and Applications, 2019, 55(11): 35-39.
|
[7] |
ZHU Shuqin1, WANG Wenhong1, SUN Zhonggui2.
Security Analysis and Improvement of Chaotic Image Encryption Algorithm
[J]. Computer Engineering and Applications, 2019, 55(1): 115-122.
|
[8] |
SUN Qin1, 2, JIANG Yanhuang1, 2, HU Wei2, ZHANG Yi2, GAO Feng3.
Feature selection algorithm based on multi-criterion ranking and C-SVM
[J]. Computer Engineering and Applications, 2018, 54(3): 125-130.
|
[9] |
LI Yarong1,LI Xiao1,GE Lixia1,HE Mingxing2.
Improved multi-message and multi-receiver hybrid signcryption scheme
[J]. Computer Engineering and Applications, 2018, 54(19): 77-81.
|
[10] |
LV Xuezhi1,2, FAN Baoxin2, ZHAO Xinhui2, YIN Jian2, WANG Xianwen2, YAO Yao2.
Availability analysis of complex redundancy system based on discrete event simulation
[J]. Computer Engineering and Applications, 2018, 54(15): 255-261.
|
[11] |
FANG Liang1, LIU Fengnian2, MIAO Fuyou1.
Group key negotiate scheme based on secret sharing
[J]. Computer Engineering and Applications, 2018, 54(12): 69-73.
|
[12] |
HE Yefeng.
Quantum key agreement protocols immune to collective noise
[J]. Computer Engineering and Applications, 2018, 54(10): 26-30.
|
[13] |
WANG Shuaijun, LI Deshi.
Turbo decoding method using residual redundancy
[J]. Computer Engineering and Applications, 2018, 54(1): 107-111.
|
[14] |
DENG Fei1, ZHU Ying2.
Novel one-round certificateless group authenticated key agreement protocol
[J]. Computer Engineering and Applications, 2017, 53(5): 111-115.
|
[15] |
LIU Jiajia, LIU Jianhua.
Fuzzy attribute-based signcryption scheme with constant length ciphertext
[J]. Computer Engineering and Applications, 2017, 53(5): 128-133.
|