[1] |
ZHANG Chao, PENG Changgen, DING Hongfa, XU Dequan.
Searchable Encryption Scheme Based on China State Cryptography Standard SM9
[J]. Computer Engineering, 2022, 48(7): 159-167.
|
[2] |
SUN Haiyan, LI Lingling, ZHANG Ling, ZHANG Jianwei, HUANG Wanwei.
An Enhanced Identity-based Authentication Key Agreement Protocol for Mobile Internet
[J]. Computer Engineering, 2019, 45(9): 153-160,182.
|
[3] |
CHENG Jinxue, XU, XU Lei, ZHAO Zemao, XUE Chunyang.
Efficient Searchable Encryption Scheme in Unsecure Channel
[J]. Computer Engineering, 2019, 45(7): 188-193.
|
[4] |
GAN Zhiwang,LIAO Fangyuan.
Rapid calculation of R-ate bilinear pairing in China state cryptography standard SM9
[J]. Computer Engineering, 2019, 45(6): 171-174.
|
[5] |
ZUO Liming,ZHOU Qing,CHEN Lanlan.
A provably security and efficient certificateless short signature scheme
[J]. Computer Engineering, 2019, 45(6): 193-198.
|
[6] |
WU Yinghao,LING Jie.
An Improved Data Integrity Verification Method for Cloud Storage
[J]. Computer Engineering, 2019, 45(3): 36-40.
|
[7] |
ZUO Liming, XIA Pingping, CHEN Zuosong.
A Provably Secure Short Blind Signature Scheme
[J]. Computer Engineering, 2019, 45(12): 114-118.
|
[8] |
NI Lulin,XU Chungen.
Dynamic Searchable Encryption Scheme Based on Identity
[J]. Computer Engineering, 2019, 45(1): 136-140.
|
[9] |
ZHU Jun,CHEN Linlin,ZHU Xian,XIE Ling,WEI Wei.
Certificateless Proxy Re-encryption Scheme for Cloud Computing Security
[J]. Computer Engineering, 2017, 43(8): 8-14.
|
[10] |
CAO Suzhen,DAI Wenjie,SUN Han,WANG Xiuya.
A New Certificateless Aggregate Signature Scheme
[J]. Computer Engineering, 2017, 43(8): 184-187.
|
[11] |
YANG Xiaodong,LI Yanan,ZHOU Qixu,GAO Guojuan,WANG Caifen.
ID-based Sever-aided Verification Proxy Re-signature Scheme
[J]. Computer Engineering, 2017, 43(4): 166-170,176.
|
[12] |
HUANG Rufen,HUANG Zhenjie,CHEN Qunshan,NONG Qiang.
Short Proxy Signature Scheme with Provable Security
[J]. Computer Engineering, 2017, 43(12): 255-260,266.
|
[13] |
YANG Xiaodong,LI Yanan,ZHOU Qixu,GAO Guojuan,WANG Caifen.
Security Analysis and Improvement of a Sever-aided Aggregate Verification Signature Scheme
[J]. Computer Engineering, 2017, 43(1): 183-187.
|
[14] |
CHEN Shaohua,FAN Xiaoguang,ZHUO Zhenfu,HUANG Jinke,SUN Xianming.
An Optimized Key Management Scheme for Ad Hoc Based on Identity
[J]. Computer Engineering, 2016, 42(4): 131-136,142.
|
[15] |
WANG Caifen,KANG Burong.
An ID-based Server-aided Verification Signcryption Scheme
[J]. Computer Engineering, 2016, 42(12): 139-144.
|