[1] |
Que Mengfei, Zhang Junwei, Yang Chao, Yang Li, Ma Jianfeng, Cui Wenxuan.
Position Based Digital Signature Scheme in IoTs
[J]. Journal of Computer Research and Development, 2018, 55(7): 1421-1431.
|
[2] |
Zhang Kai, Ma Jianfeng, Zhang Junwei, Ying Zuobin, Zhang Tao, Liu Ximeng.
Online/Offline Traceable Attribute-Based Encryption
[J]. Journal of Computer Research and Development, 2018, 55(1): 216-224.
|
[3] |
Chang Fen, Cui Jie, Wang Liangmin.
A Traceable and Anonymous Authentication Scheme Based on Elliptic Curve for Wireless Sensor Network
[J]. Journal of Computer Research and Development, 2017, 54(9): 2011-2020.
|
[4] |
Ma Jinhua, Liu Jianghua, Wu Wei, Huang Xinyi.
Survey on Redactable Signatures
[J]. Journal of Computer Research and Development, 2017, 54(10): 2144-2152.
|
[5] |
Li Fei, Gao Wei, Wang Guilin, Xie Dongqing, Tang Chunming.
Generic Tightly Secure Signature Schemes from Strong Chameleon Hash Functions
[J]. Journal of Computer Research and Development, 2017, 54(10): 2244-2254.
|
[6] |
Wang Jinshui, Weng Wei, Peng Xin.
Recovering Traceability Links Using Syntactic Analysis
[J]. Journal of Computer Research and Development, 2015, 52(3): 729-737.
|
[7] |
Wang Lina, Ren Zhengwei, Dong Yongfeng, Yu Rongwei, and Deng Ruyi.
A Management Approach to Key-Used Times Based on Trusted Platform Module in Cloud Storage
[J]. , 2013, 50(8): 1628-1636.
|
[8] |
Li Xiaofei, Shen Xuanjing, Chen Haipeng, and Lü Yingda .
An Image Identification Algorithm Based on Digital Signature Method
[J]. , 2012, 49(6): 1348-1356.
|
[9] |
Yu Jia, Kong Fanyu, Hao Rong, and Li Daxing,.
A Note on a Forward Secure Threshold Signature Scheme from Bilinear Pairing
[J]. , 2010, 47(4): 605-612.
|
[10] |
Wei Lingbo, Wu Chuankun, and Zhou Sujing,.
A New Verifier-Local Revocation Group Signature with Backward Unlinkability
[J]. , 2008, 45(8): 1315-1321.
|
[11] |
Zhong Jun and He Dake.
A Kind of Group Signature Scheme with Authorization
[J]. , 2007, 44(5): 748-755.
|
[12] |
Zhuang Yong and Feng Dengguo.
A Distributed CA-Key Generation Scheme for Resilience CA
[J]. , 2007, 44(2): 230-235.
|
[13] |
Wu Min, Zeng Xiaoyang, Han Jun, Ma Yongxin, Wu Yongyi, and Zhang Guoquan.
A Low Cost RSA Chip Design Based on CRT
[J]. , 2006, 43(4): 639-645.
|
[14] |
Wu Zhongdong, Xie Weixin, and Yu Jianping.
A Security Enhancement Method of a Verifiable Threshold Signature Scheme Based on the Elliptic Curve
[J]. , 2005, 42(4): 705-710.
|
[15] |
Zheng Jiande.
An MDP Public-Key Digital Signature Scheme
[J]. , 2005, 42(2): -.
|