[1] |
MA Yuanyuan, LIU Zhoubin, WANG Zixiang.
Research on Heterogeneous Terminal Security Access Technology in Edge Computing Scenario
[J]. Computer Engineering and Applications, 2020, 56(17): 115-120.
|
[2] |
WANG Jin, ZHANG Yonghui, GU Xiang.
Trust-aware privacy-preserving scheme for VANET
[J]. Computer Engineering and Applications, 2018, 54(6): 62-67.
|
[3] |
TIAN Juanhong, ZHANG Jianzhong, LI Yanping.
Robust multi-proxy multi-blind signature scheme
[J]. Computer Engineering and Applications, 2017, 53(1): 130-133.
|
[4] |
QIANG Xiaohui, CHEN Bo, CHEN Guokai.
Analysis and detection for HeartBleed vulnerability of OpenSSL
[J]. Computer Engineering and Applications, 2016, 52(9): 88-95.
|
[5] |
JIN Kang1,2, LI Demin1,2, TANG Hainie1,2, LI Tong1,2.
Parking algorithm based on repulsion and gravity
[J]. Computer Engineering and Applications, 2016, 52(6): 94-98.
|
[6] |
ZHANG Gang, SHI Runhua, ZHONG Hong.
Anonymous authentication scheme based on identity in VANET
[J]. Computer Engineering and Applications, 2016, 52(17): 101-106.
|
[7] |
YANG Qing1, XIN Xiaolong2.
Sequential and broadcasting blind multisignature scheme based on hyperelliptic curves
[J]. Computer Engineering and Applications, 2015, 51(2): 99-102.
|
[8] |
CHEN Ming.
Identity-based proxy blind signature scheme in standard model
[J]. Computer Engineering and Applications, 2015, 51(19): 103-109.
|
[9] |
HE Bin, DU Weizhang.
Analysis and improvement of forward secure proxy blind signature scheme
[J]. Computer Engineering and Applications, 2015, 51(18): 104-108.
|
[10] |
WU Qijia, ZHANG Jianzhong.
Blind signature scheme based on quantum secret sharing
[J]. Computer Engineering and Applications, 2015, 51(13): 63-65.
|
[11] |
YU Lei1, WEI Shimin1, ZHUO Zepeng2.
Research on consistence of strand parameters for protocol principals in authentication test theory
[J]. Computer Engineering and Applications, 2015, 51(13): 86-91.
|
[12] |
YIN Fengmei1, PU Guangning2, ZHANG Jiang1, HOU Zhengfeng3.
Threshold anonymous authentication scheme based on linear equations
[J]. Computer Engineering and Applications, 2015, 51(1): 97-101.
|
[13] |
ZHAI Zhengyuan, GAO Dezhi, LIANG Xiangqian, PAN Shuai.
Certificate-based proxy blind signature scheme
[J]. Computer Engineering and Applications, 2014, 50(4): 57-62.
|
[14] |
HU Xiaohui1, CHEN Huili1, SHI Guangtian2, CHEN Yong1.
Formal modeling and verification of CTCS-4 security protocol
[J]. Computer Engineering and Applications, 2014, 50(4): 81-85.
|
[15] |
ZHANG Jianzhong, YANG Li.
Cryptography analysis and improvement on certificateless proxy blind signature scheme
[J]. Computer Engineering and Applications, 2014, 50(4): 90-93.
|