[1] |
ZHANG Xiao-jun, TANG Hao-yu, FU Hong, WANG Wen-chen.
Anonymous authentication and key exchange protocol in intelligent vehicle networks
[J]. Computer Engineering & Science, 2024, 46(01): 83-90.
|
[2] |
ZHANG Li-li, WANG Rui-bo, WANG Xiao-dong, ZHANG Wen-zhe.
Inference rule learning in autonomous fault management systems
[J]. Computer Engineering & Science, 2023, 45(05): 772-781.
|
[3] |
NONG Qiang, SHAO Meng, ZHANG Bang-bang, LIU Zi-yu, .
A lattice-based hierarchical certificateless authentication scheme with message recovery for ADS-B
[J]. Computer Engineering & Science, 2023, 45(03): 462-469.
|
[4] |
KOU Guang-yue, WEI Guo-heng, PING Yuan, LIU Peng.
Overview of RFID security authentication protocols
[J]. Computer Engineering & Science, 2023, 45(01): 77-84.
|
[5] |
XU Cheng-zhou, ZHANG Wen-tao, LANG Jing-hong.
An attribute-based encryption scheme preventing irrelevant attributes interference
[J]. Computer Engineering & Science, 2022, 44(05): 800-809.
|
[6] |
CAO Shou-qi, HE Xin, LIU Wan-rong.
An improved remote user authentication scheme
[J]. Computer Engineering & Science, 2021, 43(11): 1960-1965.
|
[7] |
XIE Ming-hong, RAN Qiang, WANG Hong-bin, .
A Chinese distant supervised personal relationship extraction method based on TongYiCi CiLin and rules
[J]. Computer Engineering & Science, 2021, 43(09): 1661-1667.
|
[8] |
XIONG Zhong-min, WANG Bo, TAO Ran, ZHENG Zong-sheng, CHEN Ming, .
An association rule mining reduction algorithm based on determining prime attributes
[J]. Computer Engineering & Science, 2021, 43(04): 738-745.
|
[9] |
LI Dan-feng, WANG Fei, ZHAO Guo-hong.
A real-time HMAC-SM3 acceleration engine for large network traffic
[J]. Computer Engineering & Science, 2021, 43(01): 82-88.
|
[10] |
SHEN Yan-mei, LI Ya-ping, WANG Yan, WANG Hui, HUANG Li-juan.
A RLWE-based two-factor three-party authentication key exchange protocol
[J]. Computer Engineering & Science, 2020, 42(09): 1556-1562.
|
[11] |
YANG Lan-yan, JIN Min, ZHANG Ying-chun, ZHANG Xun.
A MLKNN multi-label classification algorithm based on association rules
[J]. Computer Engineering & Science, 2020, 42(07): 1309-1317.
|
[12] |
LANG Xiao-li,CAO Su-zhen,LIU Xiang-zhen,ZHANG Yu-lei,WANG Fei.
A certificateless public key authenticated searchable
encryption scheme with efficient authorization
[J]. Computer Engineering & Science, 2020, 42(03): 418-426.
|
[13] |
LI Zhong-kai,YIN Wen-wei.
An automatic design structure matrix generation
system based on 3D CAD model
[J]. Computer Engineering & Science, 2020, 42(03): 483-492.
|
[14] |
YANG Qing1,2,3,ZHANG Ya-wen1,2,ZHANG Qin1,YUAN Pei-ling1.
Research and application of a multidimensional
association rules mining algorithm based on Hadoop
[J]. Computer Engineering & Science, 2019, 41(12): 2127-2133.
|
[15] |
LIAO Ji-yong,WU Sheng,LIU Ai-lian.
An improved Apriori algorithm
based on Boolean matrix reduction
[J]. Computer Engineering & Science, 2019, 41(12): 2231-2238.
|