[1] |
YANG Zhengqiu, ZHENG Yifan, XIU Jiapeng.
Research on Security System for Internet of Vehicles Based on Digital Signature
[J]. Computer Engineering and Applications, 2022, 58(9): 116-126.
|
[2] |
LIANG Guangjun, XIN Jianfang, WANG Qun, NI Xueli, GUO Xiangmin, XIA Lingling.
Survey of IoT Forensics
[J]. Computer Engineering and Applications, 2022, 58(8): 12-32.
|
[3] |
YANG Ge, LAI Chengzhe, ZHENG Dong.
Data Forwarding Solution for Internet of Vehicles with Anonymity and Trust Evaluation
[J]. Computer Engineering and Applications, 2022, 58(7): 122-128.
|
[4] |
ZHANG Chengrui, KE Peng, YIN Mei.
Improved Artificial Bee Colony Algorithm and Its Application in Edge Computing Offloading
[J]. Computer Engineering and Applications, 2022, 58(7): 150-161.
|
[5] |
ZHANG Haibo, TAO Xiaofang, LIU Kaijian.
Resource Optimization Scheme for Non-orthogonal Multiple Access in Internet of Vehicles
[J]. Computer Engineering and Applications, 2022, 58(6): 103-109.
|
[6] |
ZHAO Shuxu, YUAN Lin, ZHANG Zhanping.
Multi-agent Edge Computing Task Offloading
[J]. Computer Engineering and Applications, 2022, 58(6): 177-182.
|
[7] |
WANG Mengting, WANG Wei, ZHANG Qiang, LIU Momeng.
Vehicular Network Message Authentication Technology Based on Proxy Vehicle
[J]. Computer Engineering and Applications, 2022, 58(5): 131-137.
|
[8] |
LIU Fasheng, SUN Qixuan, LI Jianghua.
Fusion of Double Block Chain Credit Data Storage and Query Scheme
[J]. Computer Engineering and Applications, 2022, 58(2): 123-128.
|
[9] |
HUO Xiangzuo, ZHANG Wendong, TIAN Shengwei, HOU Shuxiang.
Parallel Decoder Image Inpainting Method for Edge-Terminal Collaboration
[J]. Computer Engineering and Applications, 2022, 58(16): 257-264.
|
[10] |
HAN Mengda, CAO Lifeng, LEI Yihan, DU Xuehui.
Overview on Technology of Security Handover in Aerospace Network
[J]. Computer Engineering and Applications, 2022, 58(16): 56-70.
|
[11] |
DENG Yu, ZHAO Junhui, ZHANG Qingmiao.
Two-Level Multi-Access Edge Computing Energy-Saving Offloading Strategy for IoT
[J]. Computer Engineering and Applications, 2022, 58(13): 94-101.
|
[12] |
HE Zhangqing, XIANG Lian, WANG Chen, WU Tiezhou.
Lightweight Authentication and Session Key Exchange Protocol Based on BST-PUF
[J]. Computer Engineering and Applications, 2022, 58(1): 122-127.
|
[13] |
XU Xiaodong, WANG Junjie.
Real-Time Construction Worker Detection Method for Edge Device
[J]. Computer Engineering and Applications, 2021, 57(23): 280-286.
|
[14] |
WEI Lifei, LI Mengsi, ZHANG Lei, CHEN Congcong, CHEN Yujiao, WANG Qin.
Privacy-Preserving Linear Regression Algorithm Based on Secure Two-Party Computation
[J]. Computer Engineering and Applications, 2021, 57(22): 139-146.
|
[15] |
HE Zhiming, XU Yida.
Electronic Medical Record Sharing Scheme Based on Blockchain and Searchable Encryption
[J]. Computer Engineering and Applications, 2021, 57(21): 140-147.
|