[1] |
ZHANG Xiao-jun, TANG Hao-yu, FU Hong, WANG Wen-chen.
Anonymous authentication and key exchange protocol in intelligent vehicle networks
[J]. Computer Engineering & Science, 2024, 46(01): 83-90.
|
[2] |
NONG Qiang, SHAO Meng, ZHANG Bang-bang, LIU Zi-yu, .
A lattice-based hierarchical certificateless authentication scheme with message recovery for ADS-B
[J]. Computer Engineering & Science, 2023, 45(03): 462-469.
|
[3] |
KOU Guang-yue, WEI Guo-heng, PING Yuan, LIU Peng.
Overview of RFID security authentication protocols
[J]. Computer Engineering & Science, 2023, 45(01): 77-84.
|
[4] |
XU Cheng-zhou, ZHANG Wen-tao, LANG Jing-hong.
An attribute-based encryption scheme preventing irrelevant attributes interference
[J]. Computer Engineering & Science, 2022, 44(05): 800-809.
|
[5] |
CAO Shou-qi, HE Xin, LIU Wan-rong.
An improved remote user authentication scheme
[J]. Computer Engineering & Science, 2021, 43(11): 1960-1965.
|
[6] |
LI Dan-feng, WANG Fei, ZHAO Guo-hong.
A real-time HMAC-SM3 acceleration engine for large network traffic
[J]. Computer Engineering & Science, 2021, 43(01): 82-88.
|
[7] |
SHEN Yan-mei, LI Ya-ping, WANG Yan, WANG Hui, HUANG Li-juan.
A RLWE-based two-factor three-party authentication key exchange protocol
[J]. Computer Engineering & Science, 2020, 42(09): 1556-1562.
|
[8] |
LANG Xiao-li,CAO Su-zhen,LIU Xiang-zhen,ZHANG Yu-lei,WANG Fei.
A certificateless public key authenticated searchable
encryption scheme with efficient authorization
[J]. Computer Engineering & Science, 2020, 42(03): 418-426.
|
[9] |
CHEN Meng-dong,YUAN Hao,XIE Xiang-hui,WU Dong.
A rule processing architecture
based on distributed platform
[J]. Computer Engineering & Science, 2020, 42(01): 18-24.
|
[10] |
WANG Rui,CAO Su-zhen,WANG Fei,LANG Xiao-li,DU Xia-ling.
A batch message authentication scheme based on
certificateless key insulation in vehicular ad hoc networks
[J]. Computer Engineering & Science, 2019, 41(09): 1588-1596.
|
[11] |
CAO Shouqi,SUN Qing,CAO Liling.
An improved identity authentication scheme
of dynamic ID multi-factor remote users
[J]. Computer Engineering & Science, 2019, 41(04): 633-640.
|
[12] |
YANG Jing,FAN Mingyu,WANG Guangwei.
A wireless network anti-pollution attack scheme based on
message authentication and hybrid homomorphic signature
[J]. Computer Engineering & Science, 2019, 41(03): 458-465.
|
[13] |
SUN Ziwen,LI Fu,PANG Yongchun.
Multi-touch authentication based on
minimum risk Bayes decision
[J]. Computer Engineering & Science, 2018, 40(09): 1579-1584.
|
[14] |
WANG Caifen,CHEN Li,LIU Chao,QIAO Hui,WANG Huan.
A three-party password authentication key agreement
schemes based on chaotic maps with user anonymity
[J]. Computer Engineering & Science, 2018, 40(03): 445-455.
|
[15] |
YANG Xiao-dong1,2,YANG Ping1,LI Yan1,LIU Ting-ting1,WANG Cai-fen1.
A message authentication scheme for VANET
based on certificateless proxy re-signature
[J]. Computer Engineering & Science, 2018, 40(01): 40-44.
|