[1] |
LI Lei, XU Chungen, XU Lei, ZHAO Zemao.
Research on Electronic Medical Record Data Management in Cloud Environment
[J]. Computer Engineering and Applications, 2019, 55(15): 135-140.
|
[2] |
LI Xiaowen, LI Yangyang, LEI Xiu.
Research and Implementation of Authentication and Key Agreement Process in 5G Client
[J]. Computer Engineering and Applications, 2019, 55(11): 35-39.
|
[3] |
ZHANG Yupeng1, WEN Mi2.
Design of dual authentication algorithm for Modbus protocol
[J]. Computer Engineering and Applications, 2018, 54(20): 93-98.
|
[4] |
FANG Liang1, LIU Fengnian2, MIAO Fuyou1.
Group key negotiate scheme based on secret sharing
[J]. Computer Engineering and Applications, 2018, 54(12): 69-73.
|
[5] |
HE Yefeng.
Quantum key agreement protocols immune to collective noise
[J]. Computer Engineering and Applications, 2018, 54(10): 26-30.
|
[6] |
DENG Fei1, ZHU Ying2.
Novel one-round certificateless group authenticated key agreement protocol
[J]. Computer Engineering and Applications, 2017, 53(5): 111-115.
|
[7] |
CHEN Haihong1, LI Junyi2.
Novel ID-based group authenticated key agreement scheme
[J]. Computer Engineering and Applications, 2017, 53(21): 103-109.
|
[8] |
ZHANG Min, DU Weizhang.
Publicly verifiable and renewable multi-secret sharing scheme with self-selecting sub-secret
[J]. Computer Engineering and Applications, 2016, 52(9): 71-77.
|
[9] |
LI Ming.
Novel two-party authenticated key agreement protocol in Wireless Sensor Network
[J]. Computer Engineering and Applications, 2016, 52(3): 100-102.
|
[10] |
ZHANG Min, DU Weizhang.
Publicly verifiable and periodically renewable multi-secret sharing scheme
[J]. Computer Engineering and Applications, 2016, 52(2): 117-126.
|
[11] |
LIAO Junguo, TAN Yongzhou.
Bilateral authentication and key agreement protocol based on lightweight CA for wireless mesh networks
[J]. Computer Engineering and Applications, 2016, 52(1): 95-99.
|
[12] |
CHEN Hong1, ZHENG Yanyan1, XIAO Zhenjiu1,2.
Certificateless-based two-party authenticated key agreement protocol for multiple PKG environment without bilinear pairing
[J]. Computer Engineering and Applications, 2015, 51(7): 74-79.
|
[13] |
WANG Can1, QIAO Jianhua1,2, YAN Qingsen1.
Adaptive grid secure routing protocol based on hash-chain in WSNs
[J]. Computer Engineering and Applications, 2015, 51(2): 108-112.
|
[14] |
ZENG Ping, ZHANG Li, HU Ronglei, YANG Yatao, LIU Peihe.
Lightweight authenticated key agreement protocol based on ECC for wireless sensor networks
[J]. Computer Engineering and Applications, 2014, 50(2): 65-69.
|
[15] |
JIA Zongpu, LI He, SONG Cheng, ZHANG Xiaohong.
Efficient certificateless tripartite key agreement protocol
[J]. Computer Engineering and Applications, 2014, 50(10): 105-107.
|