[1] |
ZHANG Ping, LI Yamin.
Forward Secure Elliptic Curve Digital Signature Scheme
[J]. Computer Engineering and Applications, 2020, 56(1): 115-120.
|
[2] |
QIU Hongwei1, JIAN Biyuan2.
RFID tag ownership transfer protocol based on wheel function
[J]. Computer Engineering and Applications, 2018, 54(16): 101-106.
|
[3] |
ZHANG Min, DU Weizhang.
Publicly verifiable and renewable multi-secret sharing scheme with self-selecting sub-secret
[J]. Computer Engineering and Applications, 2016, 52(9): 71-77.
|
[4] |
ZOU Changzhi.
Identity-based multi-proxy signature without bilinear pairings
[J]. Computer Engineering and Applications, 2016, 52(9): 96-101.
|
[5] |
ZHANG Min, DU Weizhang.
Publicly verifiable and periodically renewable multi-secret sharing scheme
[J]. Computer Engineering and Applications, 2016, 52(2): 117-126.
|
[6] |
ZHAI Zhengyuan, GAO Dezhi, LIANG Xiangqian, PAN Shuai.
Certificate-based proxy blind signature scheme
[J]. Computer Engineering and Applications, 2014, 50(4): 57-62.
|
[7] |
ZHANG Yichen, JIANG Yong, LI Jiguo.
Provably secure directed transitive signature
[J]. Computer Engineering and Applications, 2014, 50(19): 74-77.
|
[8] |
RONG Weijian1, GUO Yafeng2, HUANG Zhenjie2.
Certificate-based signature scheme from factorization
[J]. Computer Engineering and Applications, 2014, 50(11): 75-80.
|
[9] |
HUANG Rufen, NONG Qiang, HUANG Zhenjie.
Efficient provably secure certificate-based signature scheme
[J]. Computer Engineering and Applications, 2013, 49(24): 55-60.
|
[10] |
PAN Shuai, GAO Dezhi, ZHAI Zhengyuan, LI Xiaolin.
Safe and effective verifiably encrypted signature scheme
[J]. Computer Engineering and Applications, 2013, 49(20): 96-99.
|
[11] |
DENG Lunzhi, WU Yunshun.
Efficient identity based proxy signature
[J]. Computer Engineering and Applications, 2013, 49(14): 98-100.
|
[12] |
CHEN Jiangshan1, HUANG Zhenjie2.
Efficient certificate-based signature scheme
[J]. Computer Engineering and Applications, 2012, 48(30): 98-102.
|
[13] |
ZHANG Xi, YANG Ling.
Efficient hierarchical ID-based encryption scheme
[J]. Computer Engineering and Applications, 2012, 48(24): 101-105.
|
[14] |
ZHANG Longxiang.
Novel RFID authentication protocol with ownership transfer property
[J]. Computer Engineering and Applications, 2012, 48(18): 95-97.
|
[15] |
MENG Hui1,2, QIAN Xu1.
Safe short proxy multi-signature scheme
[J]. Computer Engineering and Applications, 2012, 48(14): 8-11.
|