[1] |
Xu Ming, Fan Yimeng, Jiang Changjun.
Time-Varying Underwater Acoustic Channel Based Physical Layer Secret Key Generation Scheme
[J]. Journal of Computer Research and Development, 2019, 56(12): 2660-2670.
|
[2] |
Fan Lingyan, Zhou Meng, Luo Jianjun, Liu Hailuan.
IC Design with Multiple Engines Running CBC Mode SM4 Algorithm
[J]. Journal of Computer Research and Development, 2018, 55(6): 1247-1253.
|
[3] |
Zhang Qikun, Gan Yong, Wang Ruifang, Zheng Jiamin, Tan Yu’an.
Inter-Cluster Asymmetric Group Key Agreement
[J]. Journal of Computer Research and Development, 2018, 55(12): 2651-2663.
|
[4] |
Wang Jiye, Gao Lingchao, Dong Aiqiang, Guo Shaoyong, Chen Hui, Wei Xin.
Block Chain Based Data Security Sharing Network Architecture Research
[J]. Journal of Computer Research and Development, 2017, 54(4): 742-749.
|
[5] |
Chen Ming.
Strongly Secure Anonymous Implicit Authentication and Key Agreement for Roaming Service
[J]. Journal of Computer Research and Development, 2017, 54(12): 2772-2784.
|
[6] |
Yang Yatao, Zhang Yaze, Li Zichen, Zhang Fengjuan, Liu Boya.
RAKA: New Authenticated Key Agreement Protocol Based on Ring-LWE
[J]. Journal of Computer Research and Development, 2017, 54(10): 2187-2192.
|
[7] |
Wan Tao, Liu Zunxiong, Ma Jianfeng.
Authentication and Key Agreement Protocol for Multi-Server Architecture
[J]. Journal of Computer Research and Development, 2016, 53(11): 2446-2453.
|
[8] |
Xie Yong, Wu Libing, Zhang Yubo, Ye Luyao.
Anonymous Mutual Authentication and Key Agreement Protocol in Multi-Server Architecture for VANETs
[J]. Journal of Computer Research and Development, 2016, 53(10): 2323-2333.
|
[9] |
Zhang Qikun1, Wang Ruifang1, Tan Yu'an2.
Identity-Based Authenticated Asymmetric Group Key Agreement
[J]. 计算机研究与发展, 2014, 51(8): 1727-1738.
|
[10] |
Shi Yuliang,Wang Jie.
A Multi-Tenant Memory Management Mechanism for Cloud Data Storage
[J]. Journal of Computer Research and Development, 2014, 51(11): 2528-2537.
|
[11] |
Hu Juhua, Jiang Yuan, and Zhou Zhihua.
A Co-Training Method Based on Teaching-Learning Model
[J]. , 2013, 50(11): 2262-2268.
|
[12] |
Gao Haiying.
Provable Secure ID-Based Authenticated Key Agreement Protocol
[J]. , 2012, 49(8): 1685-1689.
|
[13] |
Ren Yongjun, Wang Jiandong, Xu Dazhuan, Zhuang Yi, and Wang Jian.
Key Agreement Protocol for Wireless Sensor Networks Using Self-Certified Public Key System
[J]. , 2012, 49(2): 304-311.
|
[14] |
Han Xiaosong, Pei Zhili,, Lu Xinhua, Ji Zhaohua, and Liang Yanchun,.
Simulation and Implementation of Gene Expression Regulation in E-Cell Model Analog-Cell
[J]. , 2011, 48(2): 195-202.
|
[15] |
Ren Yongjun, Wang Jiandong, Wang Jian, Xu Dazhuan, and Zhuang Yi.
Identity-Based Authenticated Key Agreement Protocols in the Standard Model
[J]. , 2010, 47(9): 1604-1610.
|