[1] |
DONG Xuedong, HAN Shuo, ZHANG Cheng.
New Paillier Digital Signature Scheme Based on Cubic Residue
[J]. Computer Engineering and Applications, 2020, 56(18): 77-81.
|
[2] |
GE Xiaoyue, ZHOU Tianyang, ZANG Yichao, ZHU Junhu.
Dynamic Defense Strategy Selection Method Based on Stackelberg Security Game
[J]. Computer Engineering and Applications, 2020, 56(17): 129-135.
|
[3] |
XIAO Shuai, WANG Xu’an, PAN Feng.
Elliptic Curve Digital Signature Algorithm Without Modular Inverse Operation
[J]. Computer Engineering and Applications, 2020, 56(11): 118-123.
|
[4] |
ZHANG Ping, LI Yamin.
Forward Secure Elliptic Curve Digital Signature Scheme
[J]. Computer Engineering and Applications, 2020, 56(1): 115-120.
|
[5] |
ZHANG Wei1, SU Yang1,2, CHEN Wenwu1.
Game model with active defense based on signaling game
[J]. Computer Engineering and Applications, 2018, 54(17): 77-82.
|
[6] |
LIU Qi, BAI Xiangyu.
DTN key management scheme for content delivery in remote area
[J]. Computer Engineering and Applications, 2018, 54(11): 81-85.
|
[7] |
SI Jian, CHEN Peng, GU Ningping, SUN Lingfeng, WANG Weimin.
Network attack graph backward depth-first building algorithm
[J]. Computer Engineering and Applications, 2017, 53(3): 131-137.
|
[8] |
ZHANG Weizhe, GAO Dezhi, LI Yan.
Hidden identity ring signature scheme using ECC
[J]. Computer Engineering and Applications, 2017, 53(23): 88-90.
|
[9] |
CHEN Yu, WANG Yadi, WANG Jindong, LI Tao.
Study of influence on information security risks by delays of security measures
[J]. Computer Engineering and Applications, 2017, 53(19): 118-123.
|
[10] |
WU Luqing, WANG Ze.
Security design based on location key for mobile Ad-Hoc networks
[J]. Computer Engineering and Applications, 2016, 52(16): 132-136.
|
[11] |
YU Jing1, LI Zhihui2.
Threshold proxy multi-signature scheme
[J]. Computer Engineering and Applications, 2015, 51(6): 69-71.
|
[12] |
LI Lanying, YI Chunhuan, SUN Jianda, LI Weijia.
Key management scheme based on unital for wireless sensor networks
[J]. Computer Engineering and Applications, 2015, 51(2): 94-98.
|
[13] |
XIAO Zhenjiu1,2, HU Chi1, CHEN Hong1.
Improved RSA algorithm and application in digital signature
[J]. Computer Engineering and Applications, 2014, 50(17): 106-109.
|
[14] |
YANG Yiqian, YUAN Jiabin.
Research on incredible users cooperate constructing anonymous region in LBS
[J]. Computer Engineering and Applications, 2014, 50(14): 82-87.
|
[15] |
HUANG Rufen, NONG Qiang, HUANG Zhenjie.
Efficient provably secure certificate-based signature scheme
[J]. Computer Engineering and Applications, 2013, 49(24): 55-60.
|