[1] |
NONG Qiang, SHAO Meng, ZHANG Bang-bang, LIU Zi-yu, .
A lattice-based hierarchical certificateless authentication scheme with message recovery for ADS-B
[J]. Computer Engineering & Science, 2023, 45(03): 462-469.
|
[2] |
HE Qi-zhi, CAO Su-zhen, WANG Cai-fen, LU Yan-fei, FANG Zi-xuan, YAN Jun-jian.
An identity-based auditable multiple interception signature scheme
[J]. Computer Engineering & Science, 2023, 45(02): 269-276.
|
[3] |
WEI Liang1,2,HUANG Zhen-jie1,CHEN Qun-shan2.
Decentralized attribute-based undeniable signature
[J]. Computer Engineering & Science, 2020, 42(06): 1003-1011.
|
[4] |
ZHANG Yulei1,LIU Xiangzhen1,ZHANG Yongjie2,LUO Guangping1,CHEN Wenjuan1,WANG Caifen1.
A provable secure from CLPKC to IDPKC
online/offline heterogeneous signcryption scheme
[J]. Computer Engineering & Science, 2019, 41(05): 813-820.
|
[5] |
CAO Suzhen1,DAI Wenjie1,WANG Caifen1,WANG Xiuya1,SUN Han1,ZUO Weiping2.
Analysis and improvement of an ID-based
partially blind signature scheme
[J]. Computer Engineering & Science, 2018, 40(12): 2193-2197.
|
[6] |
YANG Xiaodong,YANG Ping,GAO Guojuan,LIU Tingting,WANG Caifen.
A certificateless proxy re-signature
scheme with aggregate property
[J]. Computer Engineering & Science, 2018, 40(06): 1023-1028.
|
[7] |
NIU Shu-fen,NIU Ling,WANG Cai-fen,YANG Xi-yan,JIA Xiang-dong.
Privacy-preserving multi-recipient aggregate signcryption
for heterogeneous cryptography systems
[J]. Computer Engineering & Science, 2018, 40(05): 805-812.
|
[8] |
YANG Xiao-dong1,2,YANG Ping1,LI Yan1,LIU Ting-ting1,WANG Cai-fen1.
A message authentication scheme for VANET
based on certificateless proxy re-signature
[J]. Computer Engineering & Science, 2018, 40(01): 40-44.
|
[9] |
ZHOU Caixue.
Cryptanalysis and improvement of
some signcryption schemes
[J]. Computer Engineering & Science, 2016, 38(11): 2246-2253.
|
[10] |
ZHOU Ming,WANG Jian.
An efficient and provably secure proxy blind signature scheme
[J]. J4, 2015, 37(09): 1643-1651.
|
[11] |
JIA Zongpu,TIAN Xiao,LI He.
Mobile IP registration protocol
based on tripartite key agreement
[J]. J4, 2015, 37(03): 492-497.
|
[12] |
DENG Lunzhi,WANG Xiangbin,QU Yunyun.
High-efficient signcryption scheme based on identity
[J]. J4, 2014, 36(03): 441-445.
|
[13] |
WEN Jiajun,ZUO Liming,LI Biao.
An efficient certificateless proxy blind signature scheme
[J]. J4, 2014, 36(03): 452-457.
|
[14] |
ZHOU Caixue.
Cryptanalysis and improvement of
some certificateless signcryption schemes
[J]. J4, 2013, 35(8): 69-76.
|
[15] |
WU Junjun,FANG Mingwei,ZHANG Xinfang.
A NFC Authentication Model Based on Trusted Computing
[J]. J4, 2011, 33(11): 20-26.
|