| [1] |
DENG Haotian, WU Tong, ZHANG Chuan, ZHU Liehuang.
A cross-chain decentralized identity authentication scheme based on relay chain
[J]. Computer Engineering & Science, 2025, 47(6): 1008-1017.
|
| [2] |
CAO Shou-qi, HE Xin, LIU Wan-rong.
An improved remote user authentication scheme
[J]. Computer Engineering & Science, 2021, 43(11): 1960-1965.
|
| [3] |
SHEN Yan-mei, LI Ya-ping, WANG Yan, WANG Hui, HUANG Li-juan.
A RLWE-based two-factor three-party authentication key exchange protocol
[J]. Computer Engineering & Science, 2020, 42(9): 1556-1562.
|
| [4] |
FENG Feng, ZHOU Qing-lei, LI Bin.
HMAC-SHA1 password recovery based on multi-core FPGA
[J]. Computer Engineering & Science, 2020, 42(10高性能专刊): 1859-1868.
|
| [5] |
LI Bin, ZHOU Qing-lei, SI Xue-ming, FENG Feng.
A high-efficiency password recovery scheme based on hybrid reconfigurable DES computing kernel#br#
[J]. Computer Engineering & Science, 2020, 42(10高性能专刊): 1887-1896.
|
| [6] |
CHEN Hu, HAN Jian-guo.
Optimization of typical memory-hard hash functions on GPUs
[J]. Computer Engineering & Science, 2020, 42(10高性能专刊): 1905-1912.
|
| [7] |
WANG Cai-fen1,2,SU Shun-chang1,YANG Xiao-dong1.
A dynamically updated password
authorization multi-secret sharing scheme
[J]. Computer Engineering & Science, 2019, 41(9): 1597-1602.
|
| [8] |
GU Yan-bo,LI Jing-wen,HUO Jin-ping,XI Xiao-hui.
A graphical password scheme based on
multi-stroke graphics and numbers
[J]. Computer Engineering & Science, 2019, 41(11): 1954-1960.
|
| [9] |
WANG Caifen,CHEN Li,LIU Chao,QIAO Hui,WANG Huan.
A three-party password authentication key agreement
schemes based on chaotic maps with user anonymity
[J]. Computer Engineering & Science, 2018, 40(3): 445-455.
|
| [10] |
LIU Runjie,LIU Hengchao,SHEN Jinyuan.
An improved remote user anonymous
authentication scheme using smart cards
[J]. J4, 2016, 38(3): 465-470.
|
| [11] |
WANG Gan,ZHANG Wenying.
Research on properties of χ and
θ mappings in SHA-3 permutation
[J]. J4, 2015, 37(2): 281-287.
|
| [12] |
HUANG Yiping1,NONG Liping2,SU Jiande1.
Research and implementation of the
fast burning technology of smart card COS
[J]. J4, 2014, 36(9): 1650-1655.
|
| [13] |
HUANG Chaoyang,WU Zhengying,LUO Shaolan.
An secure and efficient dynamic password
authentication protocol based on smart card and fingerprint
[J]. J4, 2014, 36(9): 1711-1715.
|
| [14] |
YI Tong1,LI Xuebao2,CHEN Hongchao1.
A novel key exchange protocol
for frequent communication
[J]. J4, 2014, 36(7): 1284-1289.
|
| [15] |
ZHANG Caineng,GONG Deliang,LI Shengxin.
An event query algorithm based on Hash function and energy balancing
[J]. J4, 2014, 36(11): 2142-2147.
|