[1] |
LIU Jiajia, WU Hao, LI Panpan.
Research on Edge Computing Security of Railway 5G Mobile Communication System
[J]. Computer Engineering and Applications, 2021, 57(12): 1-10.
|
[2] |
DENG Xiaohong, ZHU Nianhong, HUANG Lei, WANG Zhiqiang, WANG Junbin.
Research on Identity Trusteeship Model Based on Blockchain
[J]. Computer Engineering and Applications, 2020, 56(4): 24-30.
|
[3] |
LIU Yu, CHEN Zhe, LI Mengheng, QIN Tuanfa.
Scheme for Information Security in Body Area Networks Based on Alliance Blockchain
[J]. Computer Engineering and Applications, 2020, 56(4): 57-62.
|
[4] |
LIU Huachao, ZHANG Junran, LIU Yunfei.
Influence of Identity Loss on CycleGAN
[J]. Computer Engineering and Applications, 2020, 56(22): 217-223.
|
[5] |
WANG Shunye, LU Tianliang, DU Yanhui.
Audio and Video File Anonymous Communication System for Smart Home
[J]. Computer Engineering and Applications, 2020, 56(15): 101-105.
|
[6] |
WANG Zhanjun, MA Haiying, WANG Jinhua, Li Yan.
Efficiently Revocable Identity-Based Online/Offline Encryption Scheme
[J]. Computer Engineering and Applications, 2020, 56(13): 114-119.
|
[7] |
HONG Pengcheng, HUANG Yicai, YU Bin.
Research on Bluetooth Encrypted Speech Synchronization for Mobile Communication Network
[J]. Computer Engineering and Applications, 2020, 56(13): 131-136.
|
[8] |
WANG Jinlong1, WANG Jianfang2.
Key Generation Algorithm of RFID System Against Tag Identity Leak
[J]. Computer Engineering and Applications, 2019, 55(4): 119-124.
|
[9] |
NIU Shufen, YANG Xiyan, LI Zhenbin, WANG Caifen.
Hybrid Signcryption Scheme Based on Heterogeneous System
[J]. Computer Engineering and Applications, 2019, 55(3): 61-67.
|
[10] |
SONG Ting, XUN Yaling.
Optimization of Mobile Communication Data Transmission System Based on Improved Thread Pool
[J]. Computer Engineering and Applications, 2019, 55(24): 68-74.
|
[11] |
YANG Minghui, ZOU Xiang.
Evaluation of US Electronic Identity Guide
[J]. Computer Engineering and Applications, 2019, 55(23): 22-28.
|
[12] |
YU Qihong, LI Jiguo.
Survey of Leakage-Resilient Encryption
[J]. Computer Engineering and Applications, 2019, 55(21): 18-25.
|
[13] |
WANG Fei, CHEN Ming.
Identity-Based Multi-Proxy Multi-Signature Scheme in Standard Model
[J]. Computer Engineering and Applications, 2019, 55(18): 67-74.
|
[14] |
JIN Cong1, HE Xin2, XIE Jidong1, ZHANG Gengxin1.
Analysis of LEO Satellite Internet of Things Architecture
[J]. Computer Engineering and Applications, 2019, 55(14): 98-104.
|
[15] |
LIAN Tianyou, YU Qin.
Human Identity Recognition Using Improved KNN Method
[J]. Computer Engineering and Applications, 2019, 55(11): 142-146.
|