| [1] |
NONG Qiang, SHAO Meng, ZHANG Bang-bang, LIU Zi-yu, .
A lattice-based hierarchical certificateless authentication scheme with message recovery for ADS-B
[J]. Computer Engineering & Science, 2023, 45(3): 462-469.
|
| [2] |
HE Qi-zhi, CAO Su-zhen, WANG Cai-fen, LU Yan-fei, FANG Zi-xuan, YAN Jun-jian.
An identity-based auditable multiple interception signature scheme
[J]. Computer Engineering & Science, 2023, 45(2): 269-276.
|
| [3] |
WEI Liang1,2,HUANG Zhen-jie1,CHEN Qun-shan2.
Decentralized attribute-based undeniable signature
[J]. Computer Engineering & Science, 2020, 42(6): 1003-1011.
|
| [4] |
ZHANG Yulei1,LIU Xiangzhen1,ZHANG Yongjie2,LUO Guangping1,CHEN Wenjuan1,WANG Caifen1.
A provable secure from CLPKC to IDPKC
online/offline heterogeneous signcryption scheme
[J]. Computer Engineering & Science, 2019, 41(5): 813-820.
|
| [5] |
YANG Xiaodong,YANG Ping,GAO Guojuan,LIU Tingting,WANG Caifen.
A certificateless proxy re-signature
scheme with aggregate property
[J]. Computer Engineering & Science, 2018, 40(6): 1023-1028.
|
| [6] |
NIU Shu-fen,NIU Ling,WANG Cai-fen,YANG Xi-yan,JIA Xiang-dong.
Privacy-preserving multi-recipient aggregate signcryption
for heterogeneous cryptography systems
[J]. Computer Engineering & Science, 2018, 40(5): 805-812.
|
| [7] |
CAO Suzhen1,DAI Wenjie1,WANG Caifen1,WANG Xiuya1,SUN Han1,ZUO Weiping2.
Analysis and improvement of an ID-based
partially blind signature scheme
[J]. Computer Engineering & Science, 2018, 40(12): 2193-2197.
|
| [8] |
YANG Xiao-dong1,2,YANG Ping1,LI Yan1,LIU Ting-ting1,WANG Cai-fen1.
A message authentication scheme for VANET
based on certificateless proxy re-signature
[J]. Computer Engineering & Science, 2018, 40(1): 40-44.
|
| [9] |
ZHOU Caixue.
Cryptanalysis and improvement of
some signcryption schemes
[J]. Computer Engineering & Science, 2016, 38(11): 2246-2253.
|
| [10] |
ZHOU Ming,WANG Jian.
An efficient and provably secure proxy blind signature scheme
[J]. J4, 2015, 37(9): 1643-1651.
|
| [11] |
JIA Zongpu,TIAN Xiao,LI He.
Mobile IP registration protocol
based on tripartite key agreement
[J]. J4, 2015, 37(3): 492-497.
|
| [12] |
WEN Jiajun,ZUO Liming,LI Biao.
An efficient certificateless proxy blind signature scheme
[J]. J4, 2014, 36(3): 452-457.
|
| [13] |
DENG Lunzhi,WANG Xiangbin,QU Yunyun.
High-efficient signcryption scheme based on identity
[J]. J4, 2014, 36(3): 441-445.
|
| [14] |
ZHOU Caixue.
Cryptanalysis and improvement of
some certificateless signcryption schemes
[J]. J4, 2013, 35(8): 69-76.
|
| [15] |
WU Junjun,FANG Mingwei,ZHANG Xinfang.
A NFC Authentication Model Based on Trusted Computing
[J]. J4, 2011, 33(11): 20-26.
|