| [1] |
DENG Haotian, WU Tong, ZHANG Chuan, ZHU Liehuang.
A cross-chain decentralized identity authentication scheme based on relay chain
[J]. Computer Engineering & Science, 2025, 47(6): 1008-1017.
|
| [2] |
ZHANG Xiaojun, ZHANG Hao, LI Xingpeng, ZHANG Jingwei.
Research and application of multi-dimensional encrypted data aggregation technology for smart oil and gas exploration and development system
[J]. Computer Engineering & Science, 2025, 47(4): 634-643.
|
| [3] |
.
A cross-domain mutual authentication scheme based on Chebyshev chaotic map for V2G
[J]. Computer Engineering & Science, 2025, 47(3): 472-484.
|
| [4] |
JIA Haozhou, XU Peng , WANG Danchen, XU Yang, .
A RFID mutual authentication protocol based on a novel confusion operation
[J]. Computer Engineering & Science, 2025, 47(2): 247-255.
|
| [5] |
Lv Fu, HAN Xiao-tian, FENG Yong-an, XIANG Liang.
A texture image classification method based on adaptive texture feature fusion
[J]. Computer Engineering & Science, 2024, 46(3): 488-498.
|
| [6] |
HAN Xiao-xuan, ZHOU Wen-an, HAN Zhen.
Vulnerability analysis and verification of 5G-AKA authentication mechanism
[J]. Computer Engineering & Science, 2024, 46(12): 2149-2157.
|
| [7] |
ZHANG Xiao-jun, TANG Hao-yu, FU Hong, WANG Wen-chen.
Anonymous authentication and key exchange protocol in intelligent vehicle networks
[J]. Computer Engineering & Science, 2024, 46(1): 83-90.
|
| [8] |
NONG Qiang, SHAO Meng, ZHANG Bang-bang, LIU Zi-yu, .
A lattice-based hierarchical certificateless authentication scheme with message recovery for ADS-B
[J]. Computer Engineering & Science, 2023, 45(3): 462-469.
|
| [9] |
KOU Guang-yue, WEI Guo-heng, PING Yuan, LIU Peng.
Overview of RFID security authentication protocols
[J]. Computer Engineering & Science, 2023, 45(1): 77-84.
|
| [10] |
XU Cheng-zhou, ZHANG Wen-tao, LANG Jing-hong.
An attribute-based encryption scheme preventing irrelevant attributes interference
[J]. Computer Engineering & Science, 2022, 44(5): 800-809.
|
| [11] |
CAO Shou-qi, HE Xin, LIU Wan-rong.
An improved remote user authentication scheme
[J]. Computer Engineering & Science, 2021, 43(11): 1960-1965.
|
| [12] |
LI Dan-feng, WANG Fei, ZHAO Guo-hong.
A real-time HMAC-SM3 acceleration engine for large network traffic
[J]. Computer Engineering & Science, 2021, 43(1): 82-88.
|
| [13] |
SHEN Yan-mei, LI Ya-ping, WANG Yan, WANG Hui, HUANG Li-juan.
A RLWE-based two-factor three-party authentication key exchange protocol
[J]. Computer Engineering & Science, 2020, 42(9): 1556-1562.
|
| [14] |
LANG Xiao-li,CAO Su-zhen,LIU Xiang-zhen,ZHANG Yu-lei,WANG Fei.
A certificateless public key authenticated searchable
encryption scheme with efficient authorization
[J]. Computer Engineering & Science, 2020, 42(3): 418-426.
|
| [15] |
CHEN Meng-dong,YUAN Hao,XIE Xiang-hui,WU Dong.
A rule processing architecture
based on distributed platform
[J]. Computer Engineering & Science, 2020, 42(1): 18-24.
|