| [1] |
TONG Le, HAO Rong, YU Jia.
Secure Outsourcing Scheme for Bilinear Pairing Based on Single Untrusted Server
[J]. Computer Engineering and Applications, 2020, 56(9): 131-135.
|
| [2] |
CHEN Hong, LIU Yumeng, XIAO Chenglong, GUO Pengfei, XIAO Zhenjiu.
Improved RC4 Algorithm Based on BBS Generator and Elliptic Curve
[J]. Computer Engineering and Applications, 2020, 56(8): 87-95.
|
| [3] |
DENG Xiaohong, ZHU Nianhong, HUANG Lei, WANG Zhiqiang, WANG Junbin.
Research on Identity Trusteeship Model Based on Blockchain
[J]. Computer Engineering and Applications, 2020, 56(4): 24-30.
|
| [4] |
LI Shuang.
Certificateless Public Key Encryption with Keyword Search
[J]. Computer Engineering and Applications, 2020, 56(20): 93-97.
|
| [5] |
CHEN Hong, ZHU Yanan, XIAO Chenglong, JIN Haibo, ZHANG Zihao.
Publicly Verifiable Certificateless Multi-receiver Anonymous Signcryption
[J]. Computer Engineering and Applications, 2020, 56(19): 120-125.
|
| [6] |
LI Yanjun, WANG Shubei, YANG Xiaotong, CAO Yisen.
Lightweight NFC Security Authentication Scheme Based on Mobile Terminal
[J]. Computer Engineering and Applications, 2020, 56(16): 84-89.
|
| [7] |
XIAO Shuai, WANG Xu’an, PAN Feng.
Elliptic Curve Digital Signature Algorithm Without Modular Inverse Operation
[J]. Computer Engineering and Applications, 2020, 56(11): 118-123.
|
| [8] |
ZHANG Ping, LI Yamin.
Forward Secure Elliptic Curve Digital Signature Scheme
[J]. Computer Engineering and Applications, 2020, 56(1): 115-120.
|
| [9] |
NIU Shufen, YANG Xiyan, LI Zhenbin, WANG Caifen.
Hybrid Signcryption Scheme Based on Heterogeneous System
[J]. Computer Engineering and Applications, 2019, 55(3): 61-67.
|
| [10] |
LI Lei, XU Chungen, XU Lei, ZHAO Zemao.
Research on Electronic Medical Record Data Management in Cloud Environment
[J]. Computer Engineering and Applications, 2019, 55(15): 135-140.
|
| [11] |
LI Xiaowen, LI Yangyang, LEI Xiu.
Research and Implementation of Authentication and Key Agreement Process in 5G Client
[J]. Computer Engineering and Applications, 2019, 55(11): 35-39.
|
| [12] |
XU Guoyu, MIAO Xuna, ZHANG Junfeng, JIANG Tao, MA Xiaofei.
Review of implicit authentication for mobile devices
[J]. Computer Engineering and Applications, 2018, 54(6): 19-25.
|
| [13] |
XU Hailin1, LU Yang2.
Searchable public key encryption secure against keyword guessing attacks
[J]. Computer Engineering and Applications, 2018, 54(24): 108-115.
|
| [14] |
XU Yong1, LIU Fen2.
Research of scheme for preventing man-in-middle attack in heterogeneous sensor networks
[J]. Computer Engineering and Applications, 2018, 54(22): 99-106.
|
| [15] |
FANG Liang1, LIU Fengnian2, MIAO Fuyou1.
Group key negotiate scheme based on secret sharing
[J]. Computer Engineering and Applications, 2018, 54(12): 69-73.
|