[1] |
Guo Lifeng, Li Zhihao, Hu Lei.
Efficient Public Encryption Scheme with Keyword Search for Cloud Storage
[J]. Journal of Computer Research and Development, 2020, 57(7): 1404-1414.
|
[2] |
Wang Huiyong, Tang Shijie, Ding Yong, Wang Yujue, Li Jiahui.
Survey on Biometrics Template Protection
[J]. Journal of Computer Research and Development, 2020, 57(5): 1003-1021.
|
[3] |
Lu Bingjie, Zhou Jun, Cao Zhenfu.
A Multi-User Forward Secure Dynamic Symmetric Searchable Encryption with Enhanced Security
[J]. Journal of Computer Research and Development, 2020, 57(10): 2104-2116.
|
[4] |
Chen Ming.
A Composable Authentication Key Exchange Scheme with Post-Quantum Forward Secrecy
[J]. Journal of Computer Research and Development, 2020, 57(10): 2158-2176.
|
[5] |
Xiao Meihua, Li Yanan, Song Jiawen, Wang Xizhong, Li Wei, Zhong Xiaomei.
Security Analysis of Authentication Protocol of WMN Client and LTCA Based on Logic of Events
[J]. Journal of Computer Research and Development, 2019, 56(6): 1275-1289.
|
[6] |
Yao Hailong, Wang Caifen, Xu Qinbai, Li Wenting.
A Distributed Biometric Authentication Protocol Based on Homomorphic Encryption
[J]. Journal of Computer Research and Development, 2019, 56(11): 2375-2383.
|
[7] |
Xu Guangwei, Shi Chunhong, Wang Wentao, Pan Qiao, Li Feng.
Multi-Keyword Searchable Encryption Algorithm Based on Semantic Extension
[J]. Journal of Computer Research and Development, 2019, 56(10): 2193-2206.
|
[8] |
Wang Yue, Fan Kai.
Ultra-Lightweight RFID Electronic Ticket Authentication Scheme in IoT
[J]. Journal of Computer Research and Development, 2018, 55(7): 1432-1439.
|
[9] |
Xu Qian, Tan Chengxiang, Fan Zhijie, Feng Jun, Zhu Wenye,Xiao Ya.
An Efficient Searchable Encryption Scheme with Designed Tester and Revocable Proxy Re-Encryption
[J]. Journal of Computer Research and Development, 2018, 55(5): 994-1013.
|
[10] |
Wei Songjie, Li Shuai, Mo Bing, Wang Jiahe.
Regional Cooperative Authentication Protocol for LEO Satellite Networks Based on Consensus Mechanism
[J]. Journal of Computer Research and Development, 2018, 55(10): 2244-2255.
|
[11] |
Chang Fen, Cui Jie, Wang Liangmin.
A Traceable and Anonymous Authentication Scheme Based on Elliptic Curve for Wireless Sensor Network
[J]. Journal of Computer Research and Development, 2017, 54(9): 2011-2020.
|
[12] |
Hui Zhen, Feng Dengguo, Zhang Min, Hong Cheng.
A Secure Index Against Statistical Analysis Attacks
[J]. Journal of Computer Research and Development, 2017, 54(2): 295-304.
|
[13] |
Wang Kaixuan, Li Yuxi, Zhou Fucai, Wang Quanqi.
Multi-Keyword Fuzzy Search over Encrypted Data
[J]. Journal of Computer Research and Development, 2017, 54(2): 348-360.
|
[14] |
Chen Ming.
Strongly Secure Anonymous Implicit Authentication and Key Agreement for Roaming Service
[J]. Journal of Computer Research and Development, 2017, 54(12): 2772-2784.
|
[15] |
Li Chunhua, Wang Hua, Zhang Yanzhe, Zhou Ke.
Optimization for Broadcast Encryption in Cloud Using Extended Public Key
[J]. Journal of Computer Research and Development, 2017, 54(12): 2818-2824.
|