[1] |
XU Chao, RUAN Rongyao, CHEN Yong, .
A blockchain-based medical data auditing method
[J]. Computer Engineering & Science, 2025, 47(01): 95-106.
|
[2] |
YANG Xu-dong, LI Qiu-yan, GAO Ling, LIU Xin, DENG Ya-ni.
A distributed location anonymization method based on multi-blockchain collaboration
[J]. Computer Engineering & Science, 2024, 46(12): 2171-2185.
|
[3] |
YANG Song, WANG Xin-ru, LI Fan, ZHU Lie-huang, ZHAO Bo.
A blockchain-based crowdsourcing incentive mechanism
[J]. Computer Engineering & Science, 2024, 46(11): 1960-1970.
|
[4] |
ZHAO Wen-tao, GUAN Li-he, HE Jian-guo, TANG Hao.
A privacy protection recommendation algorithm in block chain environment
[J]. Computer Engineering & Science, 2024, 46(06): 1032-1040.
|
[5] |
SHEN Chuan-nian.
Review on security issues of blockchains
[J]. Computer Engineering & Science, 2024, 46(01): 46-62.
|
[6] |
DING Yan, WANG Chuang, FENG Liao-liao, WANG Feng, CHANG Jun-sheng.
Trusted data circulation between alliances based on supervision of blockchain
[J]. Computer Engineering & Science, 2022, 44(10): 1771-1780.
|
[7] |
PEI Song-ying, CHEN Zhen-guo.
Research and application situation analysis of domestic blockchain technology based on bibliometrics
[J]. Computer Engineering & Science, 2021, 43(11): 1966-1978.
|
[8] |
QIN Fu-dian,LI Jing.
Influence and exploration of big data
on university teaching and research
[J]. Computer Engineering & Science, 2019, 41(增刊S1): 238-241.
|
[9] |
XU Sheng-wei1,CHEN Cheng1,2,WANG Rong-rong1,2.
Algebraic fault attack on elliptic curve
scalar multiplication algorithms
[J]. Computer Engineering & Science, 2017, 39(11): 2037-2042.
|
[10] |
WEI Guoheng1,2,WANG Ya2,ZHANG Huanguo1.
ECC point multiplication lightweight improvement
for RFID applications over GF(2m)
[J]. Computer Engineering & Science, 2017, 39(01): 81-85.
|
[11] |
XU Aiping,SONG Xianming,XU Wuping.
Research and implementation of a distributed
heterogeneous database integration system
[J]. J4, 2015, 37(10): 1909-1916.
|
[12] |
CHEN Daqian,REN Guangwei.
Reflections on community e-government
network security and data sharing
[J]. J4, 2014, 36(09): 1705-1710.
|
[13] |
ZHANG Youqiao1,ZHOU Wuneng1,SHEN Ye2,LIU Yujun2.
Improved scheme for scalar multiplication against
power analysis attacks in elliptic curve cryptography
[J]. J4, 2014, 36(04): 644-648.
|
[14] |
ZHANG Junbao,LIU Guohua,WANG Biying,WANG Mei,WANG Yuting,SHI Danni,ZHAI Hon.
Aggregate query and its properties over kanonymous data
[J]. J4, 2014, 36(01): 176-185.
|
[15] |
CHENG Rongfeng,XIAO Yingyuan.
Locationbased Skyline Queries Basedon Data Sharing in Broadcast Environments
[J]. J4, 2012, 34(10): 177-181.
|