Citation: | Jiao Sibei, Ying Lingyun, Yang Yi, Cheng Yao, Su Purui, and Feng Dengguo. An Anti-Obfuscation Method for Detecting Similarity Among Android Applications in Large Scale[J]. Journal of Computer Research and Development, 2014, 51(7): 1446-1457. |
[1] | Zhang Zelin, Wang Huaqun. Dynamic Key Management of Industrial Internet Based on Blockchain[J]. Journal of Computer Research and Development, 2023, 60(2): 386-397. DOI: 10.7544/issn1000-1239.202111095 |
[2] | Li Chunhua, Wang Hua, Zhang Yanzhe, Zhou Ke. Optimization for Broadcast Encryption in Cloud Using Extended Public Key[J]. Journal of Computer Research and Development, 2017, 54(12): 2818-2824. DOI: 10.7544/issn1000-1239.2017.20170902 |
[3] | Qin Xiongjun, Zhang Jiacheng, Lu Youyou, Shu Jiwu. A Key-Value Database Optimization Method Based on Raw Flash Device[J]. Journal of Computer Research and Development, 2017, 54(6): 1326-1336. DOI: 10.7544/issn1000-1239.2017.20170092 |
[4] | Ma Jun, Guo Yuanbo, Ma Jianfeng, Zhang Qi. A Time-Bound Hierarchical Access Control Scheme for Ubiquitous Sensing Network[J]. Journal of Computer Research and Development, 2017, 54(2): 328-337. DOI: 10.7544/issn1000-1239.2017.20150925 |
[5] | Ma Chunguang, Wang Jiuru, Wu Peng, Zhang Hua. M-IBE Based Key Management Protocol for Heterogeneous Sensor Networks[J]. Journal of Computer Research and Development, 2013, 50(10): 2109-2116. |
[6] | Wang Lina, Ren Zhengwei, Dong Yongfeng, Yu Rongwei, Deng Ruyi. A Management Approach to Key-Used Times Based on Trusted Platform Module in Cloud Storage[J]. Journal of Computer Research and Development, 2013, 50(8): 1628-1636. |
[7] | Ma Jun, Guo Yuanbo, Ma Jianfeng, Xiong Jinbo, Zhang Tao. A Hierarchical Access Control Scheme for Perceptual Layer of IoT[J]. Journal of Computer Research and Development, 2013, 50(6): 1267-1275. |
[8] | Wang Gang, Wen Tao, Guo Quan, Ma Xuebin. An Efficient and Secure Group Key Management Scheme in Mobile Ad Hoc Networks[J]. Journal of Computer Research and Development, 2010, 47(5): 911-920. |
[9] | Chen Haikun, Shi Shengfei, and Li Jianzhong. A Key Management Scheme Based on Variable Transmission Range in Wireless Sensor Networks[J]. Journal of Computer Research and Development, 2008, 45(1): 165-171. |
[10] | Feng Tao and Ma Jianfeng. A General Key Seed Management and Assignment Model for Wireless Sensor Networks and Application[J]. Journal of Computer Research and Development, 2008, 45(1): 146-153. |