[1] |
ZHOU Jian, QU Ran.
A Private Key Management Scheme on Blockchain Against Collusion Attacks
[J]. Computer Engineering, 2020, 46(11): 23-28.
|
[2] |
ZHANG Bin, GUANG Hui, CHEN Xi.
Smart Contract-based Security Architecture for Wireless Mesh Network
[J]. Computer Engineering, 2019, 45(11): 16-23,31.
|
[3] |
TANG Pengyi,LI Guochun,YU Gang,ZHONG Jun,ZHANG Yinghua,XUE Lu,ZHAO Ziyan.
VPN Enhanced Power Grid Communication Security Scheme Based on QS-KMS
[J]. Computer Engineering, 2018, 44(12): 13-17.
|
[4] |
LI Mengzhu,ZHANG Wenying,CHEN Wanpu.
Algebraic Analysis of Key Recovery on ZORRO Iterative Differential Characteristics
[J]. Computer Engineering, 2017, 43(2): 189-193.
|
[5] |
CHEN Shaohua,FAN Xiaoguang,ZHUO Zhenfu,HUANG Jinke,SUN Xianming.
An Optimized Key Management Scheme for Ad Hoc Based on Identity
[J]. Computer Engineering, 2016, 42(4): 131-136,142.
|
[6] |
ZENG Ping,ZHANG Li,YANG Ya-tao,CHU Xu,LIU Yu-xin.
A Key Management Scheme for Internet of Things Based on HECRT
[J]. Computer Engineering, 2014, 40(8): 27-32,37.
|
[7] |
GUAN Ya-wen, LIU Tao.
Low-energy Group Key Management Scheme for Wireless Sensor Network Based on Identity
[J]. Computer Engineering, 2014, 40(6): 75-78.
|
[8] |
DENG Shao-jiang, WANG Yu, TIAN Yuan, TANG Ji-qiang.
Grouping and Layered Key Management Strategy in WSN Based on EBS
[J]. Computer Engineering, 2013, 39(9): 64-68.
|
[9] |
WANG Jing, MA Fang-Meng.
Multicast Key Management Scheme Based on Orthogonality of Vector
[J]. Computer Engineering, 2013, 39(6): 162-165.
|
[10] |
LI Guan-Peng, TIAN Zhen-Chuan, SHU Gui-Liang.
Database Encryption System Based on ECDH and Rijndael
[J]. Computer Engineering, 2013, 39(4): 173-176,179.
|
[11] |
TUN Hao-Tian, CHEN Huo, TAN Feng-Hu, DAI Yang-Huan.
Group Key Management Scheme Based on Threshold
[J]. Computer Engineering, 2013, 39(3): 167-173.
|
[12] |
FAN Xiu-Wei, LEI Jian-Shu.
A Light-weight Authentication and Key Agreement Scheme for Wireless Sensor Network
[J]. Computer Engineering, 2013, 39(3): 146-151.
|
[13] |
TUN Jun, DAN Run-Hua, ZHONG Gong.
An Asymmetric Key Management Scheme for Mobile Ad hoc Network
[J]. Computer Engineering, 2013, 39(2): 103-107.
|
[14] |
LIU Tao, XIONG Yan, HUANG Wen-chao, LU Qi-wei, GONG Xu-dong.
Key Management Scheme in Wireless Sensor Network Based on Reputation Model
[J]. Computer Engineering, 2013, 39(11): 123-126.
|
[15] |
ZHOU Lin, JIAO Wen-Cheng, TUN Yang.
Group Key Management Scheme in Satellite Network Based on ID Authentication
[J]. Computer Engineering, 2012, 38(19): 85-88.
|