[1] |
ZHAO Yang, ZHANG Junhua.
Multi-scale Feature Fusion Method for Spinal X-Ray Image Segmentation
[J]. Computer Engineering and Applications, 2021, 57(8): 214-219.
|
[2] |
CHEN Hong, LIU Yumeng, XIAO Chenglong, GUO Pengfei, XIAO Zhenjiu.
Improved RC4 Algorithm Based on BBS Generator and Elliptic Curve
[J]. Computer Engineering and Applications, 2020, 56(8): 87-95.
|
[3] |
DENG Xiaohong, ZHU Nianhong, HUANG Lei, WANG Zhiqiang, WANG Junbin.
Research on Identity Trusteeship Model Based on Blockchain
[J]. Computer Engineering and Applications, 2020, 56(4): 24-30.
|
[4] |
LU Zhiliang, LIN Wei, ZENG Bi, LIU Ruixue.
Real-Time Detection Method for Robot Target Grasping Area
[J]. Computer Engineering and Applications, 2020, 56(19): 224-230.
|
[5] |
LI Yanjun, WANG Shubei, YANG Xiaotong, CAO Yisen.
Lightweight NFC Security Authentication Scheme Based on Mobile Terminal
[J]. Computer Engineering and Applications, 2020, 56(16): 84-89.
|
[6] |
DU Mengyao, WANG Zheng, LI Na, QIANG Yan.
Dynamic Password Authentication Protocol for Wireless Body Area Network
[J]. Computer Engineering and Applications, 2020, 56(14): 68-73.
|
[7] |
XIAO Shuai, WANG Xu’an, PAN Feng.
Elliptic Curve Digital Signature Algorithm Without Modular Inverse Operation
[J]. Computer Engineering and Applications, 2020, 56(11): 118-123.
|
[8] |
ZHANG Ping, LI Yamin.
Forward Secure Elliptic Curve Digital Signature Scheme
[J]. Computer Engineering and Applications, 2020, 56(1): 115-120.
|
[9] |
ZHANG Xin1, ZOU Dexuan1, XIAO Peng1, YU Qiu2.
Self-Adjusted Simplified Particle Swarm Optimization Algorithm and Its Application
[J]. Computer Engineering and Applications, 2019, 55(8): 250-263.
|
[10] |
YANG Wenxia, WANG Zheng, LI Na, MA Jianfen.
Security Analysis and Improvement of Lightweight Mobile Payment Protocol LMPP
[J]. Computer Engineering and Applications, 2019, 55(16): 88-93.
|
[11] |
ZHENG Bing1, LI Bin1, TIAN Lianfang1, DING Huanwen2, LI Liling1.
Computer-aided design of personalized pedicle screw in spinal surgery
[J]. Computer Engineering and Applications, 2018, 54(4): 218-224.
|
[12] |
XU Yong1, LIU Fen2.
Research of scheme for preventing man-in-middle attack in heterogeneous sensor networks
[J]. Computer Engineering and Applications, 2018, 54(22): 99-106.
|
[13] |
LI Qian1, WANG Zheng1, MA Jianfen1, LI Na2.
Lightweight mobile payment protocol fairness analysis
[J]. Computer Engineering and Applications, 2018, 54(19): 82-87.
|
[14] |
ZHANG Weizhe, GAO Dezhi, LI Yan.
Hidden identity ring signature scheme using ECC
[J]. Computer Engineering and Applications, 2017, 53(23): 88-90.
|
[15] |
QIN Manman, WANG Zheng, WANG Li.
Formal analysis and improvement of remote attestation protocol based on the SPIN
[J]. Computer Engineering and Applications, 2017, 53(1): 34-38.
|