[1] |
Wang Huiyong, Tang Shijie, Ding Yong, Wang Yujue, Li Jiahui.
Survey on Biometrics Template Protection
[J]. Journal of Computer Research and Development, 2020, 57(5): 1003-1021.
|
[2] |
Liu Qixu, Liu Xinyu, Luo Cheng, Wang Junnan, Chen Langping, Liu Jiaxi.
Android Browser Fingerprinting Identification Method Based on Bidirectional Recurrent Neural Network
[J]. Journal of Computer Research and Development, 2020, 57(11): 2294-2311.
|
[3] |
Yang Ningbin, Zhou Quan, Xu Shumei.
Public-Key Authenticated Encryption with Keyword Search Without Pairings
[J]. Journal of Computer Research and Development, 2020, 57(10): 2125-2135.
|
[4] |
Chen Ming.
A Composable Authentication Key Exchange Scheme with Post-Quantum Forward Secrecy
[J]. Journal of Computer Research and Development, 2020, 57(10): 2158-2176.
|
[5] |
Xiao Meihua, Li Yanan, Song Jiawen, Wang Xizhong, Li Wei, Zhong Xiaomei.
Security Analysis of Authentication Protocol of WMN Client and LTCA Based on Logic of Events
[J]. Journal of Computer Research and Development, 2019, 56(6): 1275-1289.
|
[6] |
Yao Hailong, Wang Caifen, Xu Qinbai, Li Wenting.
A Distributed Biometric Authentication Protocol Based on Homomorphic Encryption
[J]. Journal of Computer Research and Development, 2019, 56(11): 2375-2383.
|
[7] |
Wang Yue, Fan Kai.
Ultra-Lightweight RFID Electronic Ticket Authentication Scheme in IoT
[J]. Journal of Computer Research and Development, 2018, 55(7): 1432-1439.
|
[8] |
Wei Songjie, Li Shuai, Mo Bing, Wang Jiahe.
Regional Cooperative Authentication Protocol for LEO Satellite Networks Based on Consensus Mechanism
[J]. Journal of Computer Research and Development, 2018, 55(10): 2244-2255.
|
[9] |
Chang Fen, Cui Jie, Wang Liangmin.
A Traceable and Anonymous Authentication Scheme Based on Elliptic Curve for Wireless Sensor Network
[J]. Journal of Computer Research and Development, 2017, 54(9): 2011-2020.
|
[10] |
Wu Guoquan, He Meimei, Wei Jun, Zhong Hua, Huang Tao.
Cross-Browser Issues Detection in JavaScript-Based Web Applications Based on Record/Replay
[J]. Journal of Computer Research and Development, 2017, 54(3): 623-632.
|
[11] |
Chen Ming.
Strongly Secure Anonymous Implicit Authentication and Key Agreement for Roaming Service
[J]. Journal of Computer Research and Development, 2017, 54(12): 2772-2784.
|
[12] |
Ma Jinhua, Liu Jianghua, Wu Wei, Huang Xinyi.
Survey on Redactable Signatures
[J]. Journal of Computer Research and Development, 2017, 54(10): 2144-2152.
|
[13] |
Wan Tao, Liu Zunxiong, Ma Jianfeng.
Authentication and Key Agreement Protocol for Multi-Server Architecture
[J]. Journal of Computer Research and Development, 2016, 53(11): 2446-2453.
|
[14] |
Wang Ping, Wang Ding, Huang Xinyi.
Advances in Password Security
[J]. Journal of Computer Research and Development, 2016, 53(10): 2173-2188.
|
[15] |
Xie Yong, Wu Libing, Zhang Yubo, Ye Luyao.
Anonymous Mutual Authentication and Key Agreement Protocol in Multi-Server Architecture for VANETs
[J]. Journal of Computer Research and Development, 2016, 53(10): 2323-2333.
|