[1] |
WANG Yicheng, GUO Rui, MENG Tong, LIU Yingfei.
Privacy Protection Scheme Based on Proxy Blind Signcryption in Smart Grid
[J]. Computer Engineering, 2023, 49(5): 150-164.
|
[2] |
YU Chenglong, FU Guoxia, SUN Chaoli, ZHANG Guochen.
Differential Evolution Algorithm Alternately Assisted by Global and Local Models
[J]. Computer Engineering, 2022, 48(3): 115-123.
|
[3] |
GAO Ping, GUANG Hui, CHEN Xi, LI Guangsong.
Traffic Classification Method Based on Side-Channel Features for Security Proxy
[J]. Computer Engineering, 2021, 47(8): 140-148,156.
|
[4] |
NIU Shufen, LIU Wenke, CHEN Lixia, DU Xiaoni.
Data Sharing Scheme of Electronic Medical Record Based on Proxy Re-Encryption
[J]. Computer Engineering, 2021, 47(6): 164-171.
|
[5] |
NIU Shufen, CHEN Lixia, LIU Wenke, WANG Caifen, DU Xiaoni.
Proxy Re-Encryption Scheme Supporting Keyword Search in Email System
[J]. Computer Engineering, 2020, 46(6): 136-143.
|
[6] |
NIU Shufen, LI Wenting, WANG Caifen.
Partially Blind Proxy Re-Signature Scheme Without Bilinear Pairing
[J]. Computer Engineering, 2020, 46(5): 187-192.
|
[7] |
YE Qing, YANG Xiaomeng, ZHAO Zongqu, ZHANG Jing.
Forward Secure Proxy Signature Scheme over NTRU Lattice
[J]. Computer Engineering, 2019, 45(11): 133-137,143.
|
[8] |
ZHU Minhui,CHEN Yanli,HU Yuanyuan.
Identity-based Searchable Encryption Scheme Supporting Proxy Re-encryption
[J]. Computer Engineering, 2019, 45(1): 129-135,140.
|
[9] |
YANG Xiaodong,LIU Tingting,YANG Ping,AN Faying,XIAO Likun,WANG Caifen.
Integrity Verification Scheme for Cloud Data Based on Proxy Re-signature
[J]. Computer Engineering, 2018, 44(9): 130-135.
|
[10] |
ZHANG Yulei,LIU Wenjing,MA Yanli,WANG Caifen.
CP-ABE Scheme with Attribute Revocation Under Environment of Multi-attribute Authority
[J]. Computer Engineering, 2018, 44(8): 19-23,29.
|
[11] |
LIU Hongchao,MIAO Yan,HAO Hanyong,YANG Libing,WU Fan.
PostgreSQL System Access Control Method Based on Proxy Re-encryption
[J]. Computer Engineering, 2018, 44(8): 192-198.
|
[12] |
WU Xinghua,ZHANG Aixin,LI Jianhua.
Data Outsourcing and Sharing Scheme Based on Vector Commitment and Proxy Re-encryption
[J]. Computer Engineering, 2018, 44(10): 1-5.
|
[13] |
YE Weiwei,OU Qingyu,WEI Wei.
Provably Secure Identity-based Conditional Proxy Re-encryption Scheme
[J]. Computer Engineering, 2017, 43(9): 194-198,204.
|
[14] |
ZHU Jun,CHEN Linlin,ZHU Xian,XIE Ling,WEI Wei.
Certificateless Proxy Re-encryption Scheme for Cloud Computing Security
[J]. Computer Engineering, 2017, 43(8): 8-14.
|
[15] |
YANG Xiaodong,LI Yanan,ZHOU Qixu,GAO Guojuan,WANG Caifen.
ID-based Sever-aided Verification Proxy Re-signature Scheme
[J]. Computer Engineering, 2017, 43(4): 166-170,176.
|