[1] |
BAO Zhiting, KE Junming, YANG Zheng, LONG Hua, HUANG Dong.
Time-based One-Time Password Scheme for PLC
[J]. Computer Engineering, 2021, 47(8): 149-156.
|
[2] |
LIAN Wenjuan, ZHAO Duoduo, FAN Xiubin.
CFL SSL Security Communication Protocol Based on CFL_BLP Model
[J]. Computer Engineering, 2021, 47(6): 152-163.
|
[3] |
WU Tiantian, YANG Yafang, ZHAO Yunlei.
An Authentication Protocol with Conditional Privacy Protection for IoV Communication
[J]. Computer Engineering, 2021, 47(6): 14-22.
|
[4] |
LIU Qilie, CHEN Cheng.
Anonymous Identity Authentication Scheme in V2G Based on Blockchain
[J]. Computer Engineering, 2021, 47(11): 22-28.
|
[5] |
ZHANG Pengming, ZHANG Xiaomei, HU Jianpeng.
Implicit Authentication Scheme for Smart Phone Based on Dynamic Trust Value
[J]. Computer Engineering, 2021, 47(10): 132-139,146.
|
[6] |
YANG Jiyun, YAO Ruidong, ZHOU Jie, GAO Lingyun.
Efficient Authentication Scheme Based on Chebyshev Chaotic Map for VANET
[J]. Computer Engineering, 2021, 47(10): 34-42,51.
|
[7] |
LIN Mengqi, ZHANG Xiaomei.
Identity Authentication of Multi-Modal Fusion Based on Behavioral Footprint
[J]. Computer Engineering, 2021, 47(10): 116-124.
|
[8] |
YANG Xueting, LI Zhong.
Identity Authentication Scheme Based on Vehicle Behavior Prediction for IoV
[J]. Computer Engineering, 2021, 47(1): 129-138.
|
[9] |
LIU Yanan, ZHANG Zheng, QIU Shuo, CHENG Yuan.
Intra-Cluster Key Distribution Based on Physical Unclonable Functions in WSN
[J]. Computer Engineering, 2020, 46(9): 163-171.
|
[10] |
REN Dezhi, CHEN Juguang, WANG Yong, DUAN Xiaoran, HAO Yujie, WU Xiaohua.
Spatial Query Authentication Method Based on MIR Tree
[J]. Computer Engineering, 2020, 46(3): 114-119,128.
|
[11] |
YANG Xiaodong, PEI Xizhen, AN Faying, LI Ting, WANG Caifen.
Message Authentication Scheme for Vehicular Ad Hoc Network Using Identity-based Aggregate Signature
[J]. Computer Engineering, 2020, 46(2): 170-174,182.
|
[12] |
WU Kun, WEI Guoheng.
ECC-Based Certificateless Broadcast Information Authentication Scheme for WSN
[J]. Computer Engineering, 2020, 46(12): 157-162,200.
|
[13] |
HAN Jialiang, XU Ming.
Message Authentication Scheme Under Gaussian Vector Multiple-Input Channels
[J]. Computer Engineering, 2020, 46(12): 120-126.
|
[14] |
NIU Shufen, YANG Pingping, XIE Yaya, WANG Caifen, DU Xiaoni.
Keyword Search Encryption Scheme for Designated Server in Email System
[J]. Computer Engineering, 2020, 46(10): 137-142,150.
|
[15] |
SUN Haiyan, LI Lingling, ZHANG Ling, ZHANG Jianwei, HUANG Wanwei.
An Enhanced Identity-based Authentication Key Agreement Protocol for Mobile Internet
[J]. Computer Engineering, 2019, 45(9): 153-160,182.
|