[1] |
TAN Lijuan, ZHENG Wei, LIU Youlin, FAN Xin, YANG Fengyu.
Survey of Airborne Software Test and Verification Methods for Airworthiness Standards
[J]. Computer Engineering and Applications, 2021, 57(15): 9-22.
|
[2] |
CHENG Yage, HU Mingsheng, GONG Bei, WANG Lipeng, XU Erfeng.
Dynamic Threshold Signature Scheme with Strong Forward Security
[J]. Computer Engineering and Applications, 2020, 56(5): 125-134.
|
[3] |
YE Qing, YANG Xiaomeng, QIN Panke, ZHAO Zongqu, TANG Yongli.
Novel Against Quantum Attacks Group Signature Scheme Based on NTRU Lattice
[J]. Computer Engineering and Applications, 2020, 56(2): 89-96.
|
[4] |
ZHANG Ping, LI Yamin.
Forward Secure Elliptic Curve Digital Signature Scheme
[J]. Computer Engineering and Applications, 2020, 56(1): 115-120.
|
[5] |
NIU Shufen, YANG Xiyan, LI Zhenbin, WANG Caifen.
Hybrid Signcryption Scheme Based on Heterogeneous System
[J]. Computer Engineering and Applications, 2019, 55(3): 61-67.
|
[6] |
WANG Fei, CHEN Ming.
Identity-Based Multi-Proxy Multi-Signature Scheme in Standard Model
[J]. Computer Engineering and Applications, 2019, 55(18): 67-74.
|
[7] |
XU Yong1, LIU Fen2.
Research of scheme for preventing man-in-middle attack in heterogeneous sensor networks
[J]. Computer Engineering and Applications, 2018, 54(22): 99-106.
|
[8] |
ZHANG Yupeng1, WEN Mi2.
Design of dual authentication algorithm for Modbus protocol
[J]. Computer Engineering and Applications, 2018, 54(20): 93-98.
|
[9] |
LI Chenyi1, ZHANG Yulei1, ZHANG Yongjie2, WANG Caifen1.
Efficient TPKC→IDPKC heterogeneous signcryption scheme
[J]. Computer Engineering and Applications, 2018, 54(2): 125-130.
|
[10] |
LIU Niansheng.
Design and implementation of lattice-based cryptography for MIMO communications
[J]. Computer Engineering and Applications, 2018, 54(12): 10-13.
|
[11] |
WANG Yong1,2, MA Jianbin1, CHEN Yan1, HE Bo2.
New pseudorandom number generator based on spatiotemporal chaos
[J]. Computer Engineering and Applications, 2018, 54(11): 97-102.
|
[12] |
HE Yefeng.
Quantum key agreement protocols immune to collective noise
[J]. Computer Engineering and Applications, 2018, 54(10): 26-30.
|
[13] |
XU Hailin1, LU Yang2.
Efficient certificate-based proxy re-encryption scheme
[J]. Computer Engineering and Applications, 2017, 53(14): 80-86.
|
[14] |
KONG Xiaoqin, LI Qin, LI Yuanke, LIU Wu .
Simulation of quantum key distribution based on quantum entangled states
[J]. Computer Engineering and Applications, 2017, 53(1): 113-117.
|
[15] |
ZOU Changzhi.
Identity-based multi-proxy signature without bilinear pairings
[J]. Computer Engineering and Applications, 2016, 52(9): 96-101.
|