[1] |
BAI Jianfeng, MIAO Fuyou.
Constructing Ideal [(t,k,n)] Tightly Coupled Secret Sharing Scheme
[J]. Computer Engineering and Applications, 2021, 57(3): 125-129.
|
[2] |
WEI Lifei, LI Mengsi, ZHANG Lei, CHEN Congcong, CHEN Yujiao, WANG Qin.
Privacy-Preserving Linear Regression Algorithm Based on Secure Two-Party Computation
[J]. Computer Engineering and Applications, 2021, 57(22): 139-146.
|
[3] |
CHEN Hong, LIU Yumeng, XIAO Chenglong, GUO Pengfei, XIAO Zhenjiu.
Improved RC4 Algorithm Based on BBS Generator and Elliptic Curve
[J]. Computer Engineering and Applications, 2020, 56(8): 87-95.
|
[4] |
CHENG Yage, HU Mingsheng, GONG Bei, WANG Lipeng, XU Erfeng.
Dynamic Threshold Signature Scheme with Strong Forward Security
[J]. Computer Engineering and Applications, 2020, 56(5): 125-134.
|
[5] |
DENG Xiaohong, ZHU Nianhong, HUANG Lei, WANG Zhiqiang, WANG Junbin.
Research on Identity Trusteeship Model Based on Blockchain
[J]. Computer Engineering and Applications, 2020, 56(4): 24-30.
|
[6] |
HUANG Dongmei, ZHANG Xuejian, WEI Lifei, LI Mengsi, SU Cheng.
Secure Outsourced Denoising Scheme in Remote Sensing Images on Multi-cloud Architecture
[J]. Computer Engineering and Applications, 2020, 56(22): 92-99.
|
[7] |
LI Yanjun, WANG Shubei, YANG Xiaotong, CAO Yisen.
Lightweight NFC Security Authentication Scheme Based on Mobile Terminal
[J]. Computer Engineering and Applications, 2020, 56(16): 84-89.
|
[8] |
YU Lianglong, DU Weizhang.
Secret Sharing Scheme Based on Symmetric Bivariate Polynomial
[J]. Computer Engineering and Applications, 2020, 56(13): 120-123.
|
[9] |
XIAO Shuai, WANG Xu’an, PAN Feng.
Elliptic Curve Digital Signature Algorithm Without Modular Inverse Operation
[J]. Computer Engineering and Applications, 2020, 56(11): 118-123.
|
[10] |
ZHANG Ping, LI Yamin.
Forward Secure Elliptic Curve Digital Signature Scheme
[J]. Computer Engineering and Applications, 2020, 56(1): 115-120.
|
[11] |
SONG Xiuli1,2, XU Jiankun1,2.
(t,n) Threshold Quantum Secret Sharing Based on d-Dimensional Multi-Particle Entanglement State
[J]. Computer Engineering and Applications, 2019, 55(5): 89-95.
|
[12] |
LIU Haifeng, XUE Chao, LIANG Xingliang.
Threshold Scheme Based on Bivariate Lagrange Interpolation Polynomial
[J]. Computer Engineering and Applications, 2019, 55(17): 107-111.
|
[13] |
PENG Haiying, YANG Jian, SUN Lijun.
Method for constructing (3, L)-QC-LDPC codes based on Chinese Remainder Theorem
[J]. Computer Engineering and Applications, 2018, 54(5): 105-110.
|
[14] |
XU Yong1, LIU Fen2.
Research of scheme for preventing man-in-middle attack in heterogeneous sensor networks
[J]. Computer Engineering and Applications, 2018, 54(22): 99-106.
|
[15] |
HAO Na, LI Zhihui, BAI Haiyan.
Secret sharing scheme in 9-dimensional quantum system
[J]. Computer Engineering and Applications, 2018, 54(22): 107-112.
|