| [1] |
DENG Haotian, WU Tong, ZHANG Chuan, ZHU Liehuang.
A cross-chain decentralized identity authentication scheme based on relay chain
[J]. Computer Engineering & Science, 2025, 47(6): 1008-1017.
|
| [2] |
.
A cross-domain mutual authentication scheme based on Chebyshev chaotic map for V2G
[J]. Computer Engineering & Science, 2025, 47(3): 472-484.
|
| [3] |
XU Chao, RUAN Rongyao, CHEN Yong, .
A blockchain-based medical data auditing method
[J]. Computer Engineering & Science, 2025, 47(1): 95-106.
|
| [4] |
ZHAO Wen-tao, GUAN Li-he, HE Jian-guo, TANG Hao.
A privacy protection recommendation algorithm in block chain environment
[J]. Computer Engineering & Science, 2024, 46(6): 1032-1040.
|
| [5] |
YANG Xu-dong, LI Qiu-yan, GAO Ling, LIU Xin, DENG Ya-ni.
A distributed location anonymization method based on multi-blockchain collaboration
[J]. Computer Engineering & Science, 2024, 46(12): 2171-2185.
|
| [6] |
YANG Song, WANG Xin-ru, LI Fan, ZHU Lie-huang, ZHAO Bo.
A blockchain-based crowdsourcing incentive mechanism
[J]. Computer Engineering & Science, 2024, 46(11): 1960-1970.
|
| [7] |
SHEN Chuan-nian.
Review on security issues of blockchains
[J]. Computer Engineering & Science, 2024, 46(1): 46-62.
|
| [8] |
DUAN Ya-hong, WANG Zheng, ZHAO Juan-juan, WANG Long.
A verifiable attribute encryption scheme supporting decryption outsourcing in fog computing
[J]. Computer Engineering & Science, 2023, 45(3): 443-452.
|
| [9] |
LIN Qing, TENG Fei, TIAN Bo, ZHAO Yue, ZHU Jin-ye, FENG Li.
An encrypted knowledge graph storage and retrieval scheme based on searchable encryption
[J]. Computer Engineering & Science, 2023, 45(1): 66-76.
|
| [10] |
NIU Shu-fen, YU Fei, CHEN Li-xia, WANG Cai-fen.
A data sharing scheme for encrypted electronic health record
[J]. Computer Engineering & Science, 2022, 44(9): 1610-1619.
|
| [11] |
LIN Jie-he, ZHANG Shao-hua, LI Chao, DAI Bing-rong.
A blockchain data sharing system based on ECC
[J]. Computer Engineering & Science, 2022, 44(5): 810-818.
|
| [12] |
WANG Jing, QIAN Xiao-dong.
Collaborative filtering recommendation based on local sensitive hash in blockchain environment
[J]. Computer Engineering & Science, 2022, 44(3): 436-446.
|
| [13] |
LI Teng, CHENG Zhe, JIA Dong-li, JIA Yao-qing.
A practical Byzantine fault tolerant consensus algorithm based on role management
[J]. Computer Engineering & Science, 2022, 44(2): 237-243.
|
| [14] |
CHEN Qiang, TAN Lin, WANG Yun-li, XIAO Jing.
A CUDA-based data-parallel processing method in industrial blockchain
[J]. Computer Engineering & Science, 2022, 44(12): 2102-2110.
|
| [15] |
NIU Shu-fen, ZHANG Mei-ling, ZHOU Si-wei, YAN Sen.
A ciphertext verifiable attribute-based searchable encryption scheme for mobile terminals
[J]. Computer Engineering & Science, 2022, 44(11): 1941-1950.
|