[1] |
LI Rengang, REN Zhixin, WANG Jiangwei, KAN Hongwei, ZHANG Chuang, GONG Weifeng.
Design and Implementation of Memory Data Protection Technology Based on FPGA
[J]. Computer Engineering and Applications, 2020, 56(13): 72-76.
|
[2] |
WANG Zhanjun, MA Haiying, WANG Jinhua, Li Yan.
Efficiently Revocable Identity-Based Online/Offline Encryption Scheme
[J]. Computer Engineering and Applications, 2020, 56(13): 114-119.
|
[3] |
NIU Shufen, YANG Xiyan, LI Zhenbin, WANG Caifen.
Hybrid Signcryption Scheme Based on Heterogeneous System
[J]. Computer Engineering and Applications, 2019, 55(3): 61-67.
|
[4] |
CHEN Guosheng, JIANG Lei, LI Tao.
Fault-Tolerant Control of Track Tracking for Quadrotor UAV
[J]. Computer Engineering and Applications, 2019, 55(24): 259-264.
|
[5] |
YU Qihong, LI Jiguo.
Survey of Leakage-Resilient Encryption
[J]. Computer Engineering and Applications, 2019, 55(21): 18-25.
|
[6] |
WANG Fei, CHEN Ming.
Identity-Based Multi-Proxy Multi-Signature Scheme in Standard Model
[J]. Computer Engineering and Applications, 2019, 55(18): 67-74.
|
[7] |
HOU Limin, GU Haiwang, JIANG Shangkun, LIU Yu.
Research on Dual-Loop Predictive Control for PMSM Fed By Fault-Tolerant Inverter
[J]. Computer Engineering and Applications, 2019, 55(18): 212-217.
|
[8] |
WANG Zhanjun1, MA Haiying2,3, WANG Jinhua1.
identity-based lightweight encryption scheme in mobile cloud computing
[J]. Computer Engineering and Applications, 2018, 54(19): 72-76.
|
[9] |
LI Liang1, TAN Wei2, CHEN Yanping3.
Supporting data possession validation and retrieval scheme in e-health environment
[J]. Computer Engineering and Applications, 2018, 54(16): 93-100.
|
[10] |
GAO Zhi, CHEN Wei, SHAO Xing.
Attitude tracking fault-tolerant control for spacecraft with unknown time-varying inertia
[J]. Computer Engineering and Applications, 2018, 54(16): 260-265.
|
[11] |
GUO Tao.
Adaptive fault-tolerant fuzzy control of interconnected double inverted pendulum
[J]. Computer Engineering and Applications, 2017, 53(12): 261-270.
|
[12] |
ZOU Changzhi.
Identity-based multi-proxy signature without bilinear pairings
[J]. Computer Engineering and Applications, 2016, 52(9): 96-101.
|
[13] |
CHEN Ming.
Identity-based proxy blind signature scheme in standard model
[J]. Computer Engineering and Applications, 2015, 51(19): 103-109.
|
[14] |
ZHANG Ling1, WANG Weizheng2, MEI Junjin1.
Fault-tolerant design for TSVs of 3D stacked ICs
[J]. Computer Engineering and Applications, 2015, 51(14): 11-16.
|
[15] |
ZHOU Xia1, ZHONG Shouming2.
Random fault-tolerant design for a class of probability-distribution-dependent networked systems
[J]. Computer Engineering and Applications, 2014, 50(9): 17-20.
|