Citation: | Wang Qinglong, Han Zhen, Yang Bo. A Traitor Tracing Scheme Based on Bilinear Map[J]. Journal of Computer Research and Development, 2009, 46(3): 384-389. |
[1] | Pu Yonglin, Yu Jiong, Lu Liang, Li Ziyang, Guo Binglei, Liao Bin. Energy-Efficient Strategy Based on Data Recovery in Storm[J]. Journal of Computer Research and Development, 2021, 58(3): 479-496. DOI: 10.7544/issn1000-1239.2021.20200489 |
[2] | Li Zengpeng, Ma Chunguang, Zhao Minghao. Leveled Fully Homomorphic Encryption Against Adaptive Key Recovery Attacks[J]. Journal of Computer Research and Development, 2019, 56(3): 496-507. DOI: 10.7544/issn1000-1239.2019.20170443 |
[3] | Shi Hui, Li Mingchu. Safe Variable-Capacity Self-Recovery Watermarking Scheme[J]. Journal of Computer Research and Development, 2014, 51(8): 1715-1726. DOI: 10.7544/issn1000-1239.2014.20130232 |
[4] | Yuan Chunyang, Xu Junfeng, Zhu Chunge. A Trusted Recovery Model for Assurance of Integrity Policy Validity[J]. Journal of Computer Research and Development, 2014, 51(2): 360-372. |
[5] | Wang Xiaoming, Yao Guoxiang, and Liao Zhiwei. Cryptanalysis and Modification of a Traitor Tracing Scheme[J]. Journal of Computer Research and Development, 2013, 50(10): 2092-2099. |
[6] | Mei Xiaoyong, Li Shixian, Huang Changqin, Zheng Xiaolin. Failure-Recovery-Strategies-Based QoS Estimation for Web Composition Transaction[J]. Journal of Computer Research and Development, 2012, 49(11): 2464-2480. |
[7] | Hu Qiaolin, Sun Yipin, and Su Jinshu. BAR-BGP: Achieving High Reliability Interdomain Routing Through Backup AS-Address Advertisement and Recovery Forwarding[J]. Journal of Computer Research and Development, 2011, 48(12): 2242-2252. |
[8] | Yu Jia, Kong Fanyu, Hao Rong, Li Daxing. A Note on a Forward Secure Threshold Signature Scheme from Bilinear Pairing[J]. Journal of Computer Research and Development, 2010, 47(4): 605-612. |
[9] | Wei Lingbo, Wu Chuankun, Zhou Sujing. A New Verifier-Local Revocation Group Signature with Backward Unlinkability[J]. Journal of Computer Research and Development, 2008, 45(8): 1315-1321. |
[10] | Xiao Liang, Wei Zhihui, Wu Huizhong. A Generalized Variational Image Restoration Model Based on MAP and Robust Estimation[J]. Journal of Computer Research and Development, 2007, 44(7): 1105-1113. |