[1] |
Qun WANG, Fujuan LI, Xueli NI, Lingling XIA, Guangjun LIANG.
Data Formation and Privacy Threat of Blockchain
[J]. Computer Engineering, 2023, 49(8): 1-12.
|
[2] |
CHEN Qianqian, QIN Baodong.
Two-Party Cooperative Blind Signature Scheme Based on SM9
[J]. Computer Engineering, 2023, 49(6): 144-153,161.
|
[3] |
XU Yi, HOU Di.
Fast Calculation Algorithm of Approximations in Rough Sets Based on Matrices
[J]. Computer Engineering, 2023, 49(5): 22-28.
|
[4] |
HUANG Jinrong, LIU Baixiang, ZHANG Liang, ZHANG Zhanpeng.
Decentralized Anonymous Identity Authentication Model Based on Smart Contracts and Non-Fungible Tokens
[J]. Computer Engineering, 2023, 49(4): 14-22.
|
[5] |
NIU Shufen, YAN Sen, Lü Ruixi, ZHOU Siwei, ZHANG Meiling.
Privacy-Preserving Heterogeneous Aggregated Signcryption Scheme in V2V Internet of Vehicles
[J]. Computer Engineering, 2022, 48(9): 20-27,36.
|
[6] |
YANG Yang, LI Xiaoyu.
Online Anonymous Whistleblowing Scheme Based on Anonymous Communication
[J]. Computer Engineering, 2022, 48(5): 118-126.
|
[7] |
BAO Zhiting, KE Junming, YANG Zheng, LONG Hua, HUANG Dong.
Time-based One-Time Password Scheme for PLC
[J]. Computer Engineering, 2021, 47(8): 149-156.
|
[8] |
LIAN Wenjuan, ZHAO Duoduo, FAN Xiubin.
CFL SSL Security Communication Protocol Based on CFL_BLP Model
[J]. Computer Engineering, 2021, 47(6): 152-163.
|
[9] |
WU Tiantian, YANG Yafang, ZHAO Yunlei.
An Authentication Protocol with Conditional Privacy Protection for IoV Communication
[J]. Computer Engineering, 2021, 47(6): 14-22.
|
[10] |
LIU Qilie, CHEN Cheng.
Anonymous Identity Authentication Scheme in V2G Based on Blockchain
[J]. Computer Engineering, 2021, 47(11): 22-28.
|
[11] |
Lü Jia, CAO Suzhen, KOU Bangyan, ZHANG Zhiqiang, HAN Longbo.
Signcryption Scheme for Certificateless Identity Hiding Under 5G Network
[J]. Computer Engineering, 2020, 46(3): 34-39.
|
[12] |
YANG Xiaodong, PEI Xizhen, AN Faying, LI Ting, WANG Caifen.
Message Authentication Scheme for Vehicular Ad Hoc Network Using Identity-based Aggregate Signature
[J]. Computer Engineering, 2020, 46(2): 170-174,182.
|
[13] |
YANG Xiaodong, PEI Xizhen, CHEN Guilan, WANG Meiding, WANG Caifen.
Multi-User and Multi-Replica Public Data Audit Scheme Supporting User Revocation
[J]. Computer Engineering, 2020, 46(12): 150-156,192.
|
[14] |
NIU Shufen, YANG Pingping, XIE Yaya, WANG Caifen, DU Xiaoni.
Keyword Search Encryption Scheme for Designated Server in Email System
[J]. Computer Engineering, 2020, 46(10): 137-142,150.
|
[15] |
YE Qing, WANG Mingming, TANG Yongli, QIN Panke, WANG Yongjun.
HIBE Scheme Based on Programmable Hash Function on Lattices
[J]. Computer Engineering, 2020, 46(1): 129-135,143.
|