[1] |
Luo Entao, Duan Guoyun, Zhou Lei, Zhu Xiaoyu.
An Anonymous Agent Tracking Privacy Preserving Scheme in Mobile Healthcare System
[J]. Journal of Computer Research and Development, 2020, 57(5): 1070-1079.
|
[2] |
Que Mengfei, Zhang Junwei, Yang Chao, Yang Li, Ma Jianfeng, Cui Wenxuan.
Position Based Digital Signature Scheme in IoTs
[J]. Journal of Computer Research and Development, 2018, 55(7): 1421-1431.
|
[3] |
Li Fei, Gao Wei, Wang Guilin, Xie Dongqing, Tang Chunming.
Generic Tightly Secure Signature Schemes from Strong Chameleon Hash Functions
[J]. Journal of Computer Research and Development, 2017, 54(10): 2244-2254.
|
[4] |
Shi Yuan, Zhang Huanguo, Wu Fusheng.
A Method of Constructing the Model of Trusted Virtual Machine Migration
[J]. Journal of Computer Research and Development, 2017, 54(10): 2284-2295.
|
[5] |
Fan Yanfang, Cai Ying.
Collaboration Supported Mandatory Access Control Model
[J]. Journal of Computer Research and Development, 2015, 52(10): 2411-2421.
|
[6] |
Gu Ke ,, Jia Weijia, Li Chaoliang, and Chen Rongyuan.
Identity-Based Group Proxy Signature Scheme in the Standard Model
[J]. , 2013, 50(7): 1370-1386.
|
[7] |
Xu Jian, Zhou Fucai , Yang Muzhou, Li Fuxiang, and Zhu Zhiliang.
Hierarchical Hash List for Distributed Query Authentication
[J]. , 2012, 49(7): 1533-1544.
|
[8] |
Li Xiaofei, Shen Xuanjing, Chen Haipeng, and Lü Yingda .
An Image Identification Algorithm Based on Digital Signature Method
[J]. , 2012, 49(6): 1348-1356.
|
[9] |
Wu Qing, Zhang Leyou, and Hu Yupu.
A New Construction of Short Hierarchical Identity-Based Signature in the Standard Model
[J]. , 2011, 48(8): 1357-1362.
|
[10] |
Yu Jia, Kong Fanyu, Hao Rong, and Li Daxing,.
A Note on a Forward Secure Threshold Signature Scheme from Bilinear Pairing
[J]. , 2010, 47(4): 605-612.
|
[11] |
Fan Yanfang, Han Zhen, Cao Xianggang, and He Yongzhong.
A Multilevel Security Model Based on Time Limit
[J]. , 2010, 47(3): 508-514.
|
[12] |
Si Tiange, Tan Zhiyong, and Dai Yiqi.
A Security Proof Method for Multilevel Security Models
[J]. , 2008, 45(10): 1711-1717.
|
[13] |
Zhuang Yong and Feng Dengguo.
A Distributed CA-Key Generation Scheme for Resilience CA
[J]. , 2007, 44(2): 230-235.
|
[14] |
Wu Min, Zeng Xiaoyang, Han Jun, Ma Yongxin, Wu Yongyi, and Zhang Guoquan.
A Low Cost RSA Chip Design Based on CRT
[J]. , 2006, 43(4): 639-645.
|
[15] |
Wu Zhongdong, Xie Weixin, and Yu Jianping.
A Security Enhancement Method of a Verifiable Threshold Signature Scheme Based on the Elliptic Curve
[J]. , 2005, 42(4): 705-710.
|