[1] |
Wang Huiyong, Tang Shijie, Ding Yong, Wang Yujue, Li Jiahui.
Survey on Biometrics Template Protection
[J]. Journal of Computer Research and Development, 2020, 57(5): 1003-1021.
|
[2] |
Luo Entao, Duan Guoyun, Zhou Lei, Zhu Xiaoyu.
An Anonymous Agent Tracking Privacy Preserving Scheme in Mobile Healthcare System
[J]. Journal of Computer Research and Development, 2020, 57(5): 1070-1079.
|
[3] |
Ma Chencheng, Du Xuehui, Cao Lifeng, Wu Bei.
burst-Analysis Website Fingerprinting Attack Based on Deep Neural Network
[J]. Journal of Computer Research and Development, 2020, 57(4): 746-766.
|
[4] |
Yang Ningbin, Zhou Quan, Xu Shumei.
Public-Key Authenticated Encryption with Keyword Search Without Pairings
[J]. Journal of Computer Research and Development, 2020, 57(10): 2125-2135.
|
[5] |
Chen Ming.
A Composable Authentication Key Exchange Scheme with Post-Quantum Forward Secrecy
[J]. Journal of Computer Research and Development, 2020, 57(10): 2158-2176.
|
[6] |
Xiao Meihua, Li Yanan, Song Jiawen, Wang Xizhong, Li Wei, Zhong Xiaomei.
Security Analysis of Authentication Protocol of WMN Client and LTCA Based on Logic of Events
[J]. Journal of Computer Research and Development, 2019, 56(6): 1275-1289.
|
[7] |
Xu Ming, Fan Yimeng, Jiang Changjun.
Time-Varying Underwater Acoustic Channel Based Physical Layer Secret Key Generation Scheme
[J]. Journal of Computer Research and Development, 2019, 56(12): 2660-2670.
|
[8] |
Yao Hailong, Wang Caifen, Xu Qinbai, Li Wenting.
A Distributed Biometric Authentication Protocol Based on Homomorphic Encryption
[J]. Journal of Computer Research and Development, 2019, 56(11): 2375-2383.
|
[9] |
Luo Junzhou, Yang Ming, Ling Zhen, Wu Wenjia, Gu Xiaodan.
Anonymous Communication and Darknet: A Survey
[J]. Journal of Computer Research and Development, 2019, 56(1): 103-130.
|
[10] |
Zhang Liancheng, Wang Yu, Kong Yazhou,Qiu Han.
Survey on Security Threats and Countermeasures of Network Flow Watermarking
[J]. Journal of Computer Research and Development, 2018, 55(8): 1785-1799.
|
[11] |
Zhou Weiwei, Yu Bin.
A Secure Transmission Model Between the Nodes in Clusters of Wireless Service System for Internet of Things
[J]. Journal of Computer Research and Development, 2018, 55(7): 1393-1408.
|
[12] |
Wang Yue, Fan Kai.
Ultra-Lightweight RFID Electronic Ticket Authentication Scheme in IoT
[J]. Journal of Computer Research and Development, 2018, 55(7): 1432-1439.
|
[13] |
Zhang Qikun, Gan Yong, Wang Ruifang, Zheng Jiamin, Tan Yu’an.
Inter-Cluster Asymmetric Group Key Agreement
[J]. Journal of Computer Research and Development, 2018, 55(12): 2651-2663.
|
[14] |
Zhou Zhibin, Wang Guojun, Liu Qin, Jia Weijia.
A RFID Anonymous Grouping Proof Protocol Using Dual-Layer Verification
[J]. Journal of Computer Research and Development, 2018, 55(12): 2674-2684.
|
[15] |
Wang Ziyu, Liu Jianwei, Zhang Zongyang, Yu Hui.
Full Anonymous Blockchain Based on Aggregate Signature and Confidential Transaction
[J]. Journal of Computer Research and Development, 2018, 55(10): 2185-2198.
|