[1] |
WANG Haoyan, WANG Yumei.
Research on Cognitive Wireless Networks with Two Kinds of Cognitive Users and Channel Aggregation
[J]. Computer Engineering and Applications, 2020, 56(22): 100-108.
|
[2] |
LI Shuang.
Certificateless Public Key Encryption with Keyword Search
[J]. Computer Engineering and Applications, 2020, 56(20): 93-97.
|
[3] |
CHEN Hong, ZHU Yanan, XIAO Chenglong, JIN Haibo, ZHANG Zihao.
Publicly Verifiable Certificateless Multi-receiver Anonymous Signcryption
[J]. Computer Engineering and Applications, 2020, 56(19): 120-125.
|
[4] |
WANG Yaming, TANG Junyong, LEI Juchao.
Wireless Network Congestion Algorithm for Noise Packet Loss Sensing
[J]. Computer Engineering and Applications, 2020, 56(14): 93-97.
|
[5] |
ZHOU Linteng, LIU Ming.
Cloud to Side Hybrid Caching Strategy for Content Heterogeneous 5G Wireless Networks
[J]. Computer Engineering and Applications, 2019, 55(6): 94-100.
|
[6] |
NIU Shufen, YANG Xiyan, LI Zhenbin, WANG Caifen.
Hybrid Signcryption Scheme Based on Heterogeneous System
[J]. Computer Engineering and Applications, 2019, 55(3): 61-67.
|
[7] |
SUI Nannan1, WANG Cong1, ZHANG Dongmei1, ZHOU Xin2, XU Youyun1,3.
CMT-SC:Packet loss detection scheme for CMT in heterogeneous wireless environment
[J]. Computer Engineering and Applications, 2018, 54(3): 94-99.
|
[8] |
GE Lixia1, LI Xiao1, HE Mingxing2, LI Yarong1, LIU Xiaojian2.
Improved certificateless proxy signature scheme
[J]. Computer Engineering and Applications, 2017, 53(8): 92-94.
|
[9] |
GUO Jing, WANG Xuecheng, YUAN Chunping.
Survey on MAC layer rate control mechanisms
[J]. Computer Engineering and Applications, 2017, 53(6): 7-13.
|
[10] |
DENG Fei1, ZHU Ying2.
Novel one-round certificateless group authenticated key agreement protocol
[J]. Computer Engineering and Applications, 2017, 53(5): 111-115.
|
[11] |
WANG Shujuan, YAN Chunting, MAO Zhiyuan.
In-order progressive transmission with imperfect feedbacks in wireless networks
[J]. Computer Engineering and Applications, 2016, 52(8): 97-101.
|
[12] |
LI Yarong1, LI Xiao1, HE Mingxing2, LIU Xiaojian2, GE Lixia1.
Security analysis and improvement of forward secure proxy signature scheme
[J]. Computer Engineering and Applications, 2016, 52(14): 110-114.
|
[13] |
LIU Jianhua1,2, ZHAO Changxiao2, MAO Kefei3.
Efficient certificateless aggregate signcryption scheme based on XOR
[J]. Computer Engineering and Applications, 2016, 52(12): 131-135.
|
[14] |
HU Jianghong1, DU Hongzhen1, ZHANG Jianzhong2.
Analysis and improvement of certificateless aggregate signature scheme
[J]. Computer Engineering and Applications, 2016, 52(10): 80-84.
|
[15] |
CHEN Hong1, ZHENG Yanyan1, XIAO Zhenjiu1,2.
Certificateless-based two-party authenticated key agreement protocol for multiple PKG environment without bilinear pairing
[J]. Computer Engineering and Applications, 2015, 51(7): 74-79.
|