[1] |
Que Mengfei, Zhang Junwei, Yang Chao, Yang Li, Ma Jianfeng, Cui Wenxuan.
Position Based Digital Signature Scheme in IoTs
[J]. Journal of Computer Research and Development, 2018, 55(7): 1421-1431.
|
[2] |
Li Fei, Gao Wei, Wang Guilin, Xie Dongqing, Tang Chunming.
Generic Tightly Secure Signature Schemes from Strong Chameleon Hash Functions
[J]. Journal of Computer Research and Development, 2017, 54(10): 2244-2254.
|
[3] |
Ma Haiying, Zeng Guosun, Bao Zhihua, Chen Jianping, Wang Jinhua,Wang Zhanjun.
Attribute-Based Encryption Scheme Resilient Against Continuous Auxiliary-Inputs Leakage
[J]. Journal of Computer Research and Development, 2016, 53(8): 1867-1878.
|
[4] |
Li Zhen, Jiang Han, Zhao Minghao.
A Discretionary Searchable Encryption Scheme in Multi-User Settings
[J]. Journal of Computer Research and Development, 2015, 52(10): 2313-2322.
|
[5] |
Zhong Ting, Han Xiao, Zhao Yulong.
Provable Data Possession by Partial Delegation
[J]. Journal of Computer Research and Development, 2015, 52(10): 2422-2430.
|
[6] |
Yang Chao, Zhang Junwei, Dong Xuewen, Ma Jianfeng.
Proving Method of Ownership of Encrypted Files in Cloud De-Duplication Deletion
[J]. Journal of Computer Research and Development, 2015, 52(1): 248-258.
|
[7] |
Sun Xiaochao, Li Bao, and Lu Xianhui.
LWE Problem with Uniform Secret and Errors and Its Application
[J]. 计算机研究与发展, 2014, 51(7): 1515-1519.
|
[8] |
Yuan Ke, Liu Zheli, Jia Chunfu, Ma Haoyu, and Lü Shuwang.
Research on Timed-Release Encryption
[J]. Journal of Computer Research and Development, 2014, 51(6): 1206-1220.
|
[9] |
Ge Lirong, Yu Jia, Cheng Xiangguo, Hao Rong, Zhao Huiyan, and Li Meng.
Strong Key-Insulated Signature Scheme Supporting Multi-Helpers in the Standard Model
[J]. Journal of Computer Research and Development, 2014, 51(5): 1081-1088.
|
[10] |
Tan Liang, Meng Weiming, and Zhou Mingtian.
An Improved Direct Anonymous Attestation Scheme
[J]. Journal of Computer Research and Development, 2014, 51(2): 334-343.
|
[11] |
Li Huixian, Chen Xubao, Ju Longfei, Pang Liaojun, and Wang Yumin.
Improved Multi-Receiver Signcryption Scheme
[J]. , 2013, 50(7): 1418-1425.
|
[12] |
Gu Ke ,, Jia Weijia, Li Chaoliang, and Chen Rongyuan.
Identity-Based Group Proxy Signature Scheme in the Standard Model
[J]. , 2013, 50(7): 1370-1386.
|
[13] |
Ma Jun, Guo Yuanbo, Ma Jianfeng, Xiong Jinbo, and Zhang Tao.
A Hierarchical Access Control Scheme for Perceptual Layer of IoT
[J]. 计算机研究与发展, 2013, 50(6): 1267-1275.
|
[14] |
Wang Zhiwei and Zhang Wei.
ID Based Signature Scheme from Strong RSA Assumption in the Standard Model
[J]. , 2013, 50(2): 302-306.
|
[15] |
Gu Ke, Jia Weijia, and Jiang Chunlin,.
A Group Proxy Signature Scheme Based on Sub-Secret Evolution
[J]. , 2012, 49(5): 962-973.
|