[1] |
ZHAI Sheping, CHEN Siji, WANG Yijing.
Research on Digital Copyright Storage System Model Based on Blockchain
[J]. Computer Engineering and Applications, 2020, 56(19): 13-21.
|
[2] |
YU Lianglong, DU Weizhang.
Secret Sharing Scheme Based on Symmetric Bivariate Polynomial
[J]. Computer Engineering and Applications, 2020, 56(13): 120-123.
|
[3] |
DENG Fei1, ZHU Ying2.
Anonymous authenticated key agreement protocol with provable security
[J]. Computer Engineering and Applications, 2018, 54(5): 101-104.
|
[4] |
DENG Fei1, ZHU Ying2.
Novel one-round certificateless group authenticated key agreement protocol
[J]. Computer Engineering and Applications, 2017, 53(5): 111-115.
|
[5] |
ZHANG Weizhe, GAO Dezhi, LI Yan.
Hidden identity ring signature scheme using ECC
[J]. Computer Engineering and Applications, 2017, 53(23): 88-90.
|
[6] |
TIAN Juanhong, ZHANG Jianzhong, LI Yanping.
Robust multi-proxy multi-blind signature scheme
[J]. Computer Engineering and Applications, 2017, 53(1): 130-133.
|
[7] |
ZOU Changzhi.
Identity-based multi-proxy signature without bilinear pairings
[J]. Computer Engineering and Applications, 2016, 52(9): 96-101.
|
[8] |
ZHANG Jiao, HE Yong, LI Xiong.
Cryptanalysis and improvement of two verifiable ring signature schemes
[J]. Computer Engineering and Applications, 2016, 52(8): 115-119.
|
[9] |
PI Lan1,2, WU Chuankun1.
Improved remote asynchronous authentication scheme with smart card
[J]. Computer Engineering and Applications, 2014, 50(8): 61-65.
|
[10] |
ZHANG Yong, ZHANG Huan.
Secret sharing scheme based on elliptic curve
[J]. Computer Engineering and Applications, 2014, 50(8): 90-92.
|
[11] |
LI Huige, ZHANG Jianzhong.
New certificateless signcryption scheme
[J]. Computer Engineering and Applications, 2014, 50(5): 86-89.
|
[12] |
ZHANG Yichen, JIANG Yong, LI Jiguo.
Provably secure directed transitive signature
[J]. Computer Engineering and Applications, 2014, 50(19): 74-77.
|
[13] |
ZHAO Hongjian1, DA Hanqiao2, HU Yuanming3.
Improved algorithm research for lattice-based verifier ring signature
[J]. Computer Engineering and Applications, 2014, 50(18): 103-108.
|
[14] |
CHEN Lin.
Cryptanalysis and improvement for two certificateless proxy signature schemes
[J]. Computer Engineering and Applications, 2013, 49(7): 85-88.
|
[15] |
GUO Shuai1, XIE Shucui2.
Secret sharing scheme based on elliptic curves
[J]. Computer Engineering and Applications, 2013, 49(6): 97-99.
|