[1] |
XUN Peng, CHEN Hong-yan, WANG Yong-zhi, LI Shi-jie.
An intrinsic secure open shortest path first protocol based on identity cryptography
[J]. Computer Engineering & Science, 2024, 46(06): 1022-1031.
|
[2] |
ZHANG Feng, WEN Bin, YAN Yi-fei, ZENG Zhao-wu, ZHOU Wei, .
An identity-encryption multi-cloud multi-copy integrity auditing protocol
[J]. Computer Engineering & Science, 2024, 46(03): 453-462.
|
[3] |
ZHANG Xiao-jun, TANG Hao-yu, FU Hong, WANG Wen-chen.
Anonymous authentication and key exchange protocol in intelligent vehicle networks
[J]. Computer Engineering & Science, 2024, 46(01): 83-90.
|
[4] |
DING Bin-bin, CAO Su-zhen, DING Xiao-hui, DOU Feng-ge, MA Jia-jia.
Pairing-free identity-based public key encryption with equality test
[J]. Computer Engineering & Science, 2022, 44(12): 2146-2152.
|
[5] |
CUI Chen-yu, ZHANG Li-na, .
A threshold multi-secret sharing scheme with identity lock
[J]. Computer Engineering & Science, 2022, 44(08): 1382-1391.
|
[6] |
NIU Shu-fen, FANG Li-zhi, SONG Mi, WANG Cai-fen, DU Xiao-ni.
Privacy-preserving broadcast encryption in smart city
[J]. Computer Engineering & Science, 2022, 44(06): 1003-1012.
|
[7] |
CAO Shou-qi, HE Xin, LIU Wan-rong.
An improved remote user authentication scheme
[J]. Computer Engineering & Science, 2021, 43(11): 1960-1965.
|
[8] |
MA Yan-fang1,WANG Meng-yue1,ZHOU Wei1,CHEN Liang2.
A trustworthiness-based development cost
allocation algorithm of modular software
[J]. Computer Engineering & Science, 2020, 42(06): 1021-1029.
|
[9] |
ZHANG Yu-lei1,LUO Guang-ping1,ZHANG Yong-jie2,ZHANG Xue-wei1,LIU Xiang-zhen1,WANG Cai-fen3.
A format preserving encryption scheme
for sensitive information
[J]. Computer Engineering & Science, 2020, 42(02): 236-240.
|
[10] |
SONG Si-yi1,2,CHEN Hao-yu1,2,XU Yun1,2.
A novel sequence alignment method for third-generation
sequencing based on low frequency seeds
[J]. Computer Engineering & Science, 2019, 41(09): 1551-1556.
|
[11] |
ZHANG Yulei1,LIU Xiangzhen1,ZHANG Yongjie2,LUO Guangping1,CHEN Wenjuan1,WANG Caifen1.
A provable secure from CLPKC to IDPKC
online/offline heterogeneous signcryption scheme
[J]. Computer Engineering & Science, 2019, 41(05): 813-820.
|
[12] |
CAO Shouqi,SUN Qing,CAO Liling.
An improved identity authentication scheme
of dynamic ID multi-factor remote users
[J]. Computer Engineering & Science, 2019, 41(04): 633-640.
|
[13] |
NIU Shu-fen,NIU Ling,WANG Cai-fen,YANG Xi-yan,JIA Xiang-dong.
Privacy-preserving multi-recipient aggregate signcryption
for heterogeneous cryptography systems
[J]. Computer Engineering & Science, 2018, 40(05): 805-812.
|
[14] |
KAN Yuanping.
An identity-based signature scheme
with message recovery over lattice
[J]. Computer Engineering & Science, 2018, 40(04): 660-664.
|
[15] |
LI Juan1,TANG De-you1,FU Juan2,3.
A parallel alignment method for biological
sequences based on ant colony algorithm
[J]. Computer Engineering & Science, 2017, 39(09): 1610-1616.
|