[1] |
NIU Shufen, YAN Sen, Lü Ruixi, ZHOU Siwei, ZHANG Meiling.
Privacy-Preserving Heterogeneous Aggregated Signcryption Scheme in V2V Internet of Vehicles
[J]. Computer Engineering, 2022, 48(9): 20-27,36.
|
[2] |
LIAN Wenjuan, ZHAO Duoduo, FAN Xiubin.
CFL SSL Security Communication Protocol Based on CFL_BLP Model
[J]. Computer Engineering, 2021, 47(6): 152-163.
|
[3] |
JIAN Chunfu,XIE Jihua,JIN Junhua.
Research and Application of Cloud Digital Signature Technology
[J]. Computer Engineering, 2017, 43(12): 1-5.
|
[4] |
LIU Jun, FAN Lin-Na, TUN Zhao-Feng, GUO Ji-Bin.
Grid Authentication Model Based on Kerberos and HIBC
[J]. Computer Engineering, 2013, 39(5): 140-143,147.
|
[5] |
HUI Lin-Na, GAO Wei, LIANG Bin-Mei.
A Secret Sharing Scheme of Identity-based Private Key
[J]. Computer Engineering, 2012, 38(23): 137-138,142.
|
[6] |
LI Feng, ZHANG Chang-Hong, ZHOU Li-Bing.
PKI Trust Evaluation Model Based on Subjective Logic
[J]. Computer Engineering, 2012, 38(01): 10-13.
|
[7] |
HU Ming-Song, LI Xie-Hua, CAO Ji-Hong, GAO Chun-Ming.
Security-enhanced Wireless Authentication and Key Agreement Protocol
[J]. Computer Engineering, 2011, 37(17): 116-118,135.
|
[8] |
HU Yong-Chao, TAO Jing-Jing, HU Shan-Hua.
Analysis of Potential Risks for Private Key File in Smart Card
[J]. Computer Engineering, 2011, 37(15): 106-109.
|
[9] |
ZHANG Xiao-Bei, CHENG Liang-Lun.
Application of PKI in Virtual Private Network
[J]. Computer Engineering, 2011, 37(15): 113-115.
|
[10] |
ZHOU Jia-Jing, WANG Fu, CHEN Han-Hui, JU Xiang-.
Calculation Method of PKI Cross-domain Trust
[J]. Computer Engineering, 2011, 37(13): 115-118.
|
[11] |
HU Shan-Hua, HU Yong-Chao, TAO Jing-Jing, ZHOU Jia-Jing.
Analysis and Application of UCONABC-based Smart Card
[J]. Computer Engineering, 2011, 37(11): 167-169.
|
[12] |
CHEN Chao, LUO Mo-Meng, YAN Bao-Beng.
Trustworthy Communication Mechanism Based on IPv6 Real-name Address
[J]. Computer Engineering, 2010, 36(19): 11-13.
|
[13] |
JU Xiang, LIU Gao, WANG Fu.
Network Border Security Monitor Method Based on PKI
[J]. Computer Engineering, 2010, 36(13): 140-142.
|
[14] |
ZHOU Hai-yan; ZHAO Jian-yang.
Certificate Revocation System Based on AVL Search Tree
[J]. Computer Engineering, 2009, 35(9): 174-175,.
|
[15] |
ZHANG Qian; ZHU Yan-qin; LUO Xi-zhao;.
Cross-certification Scheme Based on Improved OCSP
[J]. Computer Engineering, 2009, 35(8): 182-185.
|