[1] |
Luo Entao, Duan Guoyun, Zhou Lei, Zhu Xiaoyu.
An Anonymous Agent Tracking Privacy Preserving Scheme in Mobile Healthcare System
[J]. Journal of Computer Research and Development, 2020, 57(5): 1070-1079.
|
[2] |
Miao Chunyu, Chen Lina, Wu Jianjun, Zhou Jiaqing, Feng Xuhang.
Node Location Verification Framework for WSN
[J]. Journal of Computer Research and Development, 2019, 56(6): 1231-1243.
|
[3] |
Tian Yangtong, Zhang Huang, Xie Shaohao, Zhang Fangguo.
Post-Quantum Privacy Preserving Smart Metering System
[J]. Journal of Computer Research and Development, 2019, 56(10): 2229-2242.
|
[4] |
Zhang Kai, Ma Jianfeng, Zhang Junwei, Ying Zuobin, Zhang Tao, Liu Ximeng.
Online/Offline Traceable Attribute-Based Encryption
[J]. Journal of Computer Research and Development, 2018, 55(1): 216-224.
|
[5] |
Zeng Jiandian, Wang Tian, Jia Weijia, Peng Shaoliang, Wang Guojun.
A Survey on Sensor-Cloud
[J]. Journal of Computer Research and Development, 2017, 54(5): 925-939.
|
[6] |
Li Zhetao, Zang Lang, Tian Shujuan, Li Renfa.
Data Collection Method in Clustering Network Based on Hybrid Compressive Sensing
[J]. Journal of Computer Research and Development, 2017, 54(3): 493-501.
|
[7] |
Qin Junping, Deng Qingxu, Sun Shiwen, Renqing Daoerji, Tong Haibin, Su Xianli.
Indoor Trajectory Tracking Algorithm Based on Time Series Heuristic Information
[J]. Journal of Computer Research and Development, 2017, 54(12): 2698-2710.
|
[8] |
Fu Xiuwen, Li Wenfeng, Duan Ying.
Invulnerability of Clustering Wireless Sensor Network Towards Cascading Failures
[J]. Journal of Computer Research and Development, 2016, 53(12): 2882-2892.
|
[9] |
Zhang Zhao.
Survey of Approximation Algorithm on Virtual Backbone of Wireless Sensor Network
[J]. Journal of Computer Research and Development, 2016, 53(1): 15-25.
|
[10] |
Wang Jinshui, Weng Wei, Peng Xin.
Recovering Traceability Links Using Syntactic Analysis
[J]. Journal of Computer Research and Development, 2015, 52(3): 729-737.
|
[11] |
Zhao Ze, Shang Pengfei, Liu Qiang, Cui Li.
Identification of Communication State for Wireless Sensor Networks
[J]. Journal of Computer Research and Development, 2014, 51(11): 2382-2392.
|
[12] |
Zhang Yunzhou, Fu Wenyan, Xiang Shu, Wei Dongfei, Yang Bing.
IMM-EKF Algorithm-Based Indoor Moving Target Localization
[J]. Journal of Computer Research and Development, 2014, 51(11): 2408-2415.
|
[13] |
Chen Shaozhen, Wang Wenqiang, and Peng Shujuan.
Efficient AttributeBased Ring Signature Schemes
[J]. , 2010, 47(12): -.
|
[14] |
Liu Xinhua, Li Fangmin, Kuang Hailan, and Fang Yilin.
An Distributed and Directed Clustering Algorithm Based on Load Balance for Wireless Sensor Network
[J]. , 2009, 46(12): 2044-2052.
|
[15] |
Wei Lingbo, Wu Chuankun, and Zhou Sujing,.
A New Verifier-Local Revocation Group Signature with Backward Unlinkability
[J]. , 2008, 45(8): 1315-1321.
|