[1] |
REN Miaomiao, PAN Zhuo, XU Xianghui, SU Haitao.
Very high resolution (VHR) SAR image simulation for buildings
[J]. , 2018, 35(6): 788-794.
|
[2] |
JIA Shijie, XIA Luning, WEN Nan.
Signature private key generation method based on the physical properties of Nand Flash and its applications
[J]. , 2015, 32(5): 695-700.
|
[3] |
ZHANG Yan, ZHANG Liwu, ZHANG Moli.
Efficient attribute-based signature with constant signature size
[J]. , 2015, 32(5): 708-713.
|
[4] |
ZHANG Mingqing, ZHANG Can, CHEN Deyuan, ZHANG Kenan.
A mobile classification security method for SMS based on Android system
[J]. , 2015, 32(2): 281-287.
|
[5] |
HUANG Gui-Fang, HU Lei.
Statistically binding non-interactive non-mallebale commitment
[J]. , 2013, 30(2): 264-271.
|
[6] |
LI Ling, LI Jing, XU Lin, WANG Wei-Wei.
Privacy protection of user identities in cloud computing
[J]. , 2013, 30(1): 98-105.
|
[7] |
WEI Yun, XIONG Guo-Hua, ZHANG Xing-Kai, BAO Wan-Su.
A strong blind signature scheme over the braid groups
[J]. , 2011, 28(6): 826-831.
|
[8] |
ZHAO Yong-Bin, FAN Tong-Rang.
Simple proof of bit security for NTRU
[J]. , 2011, 28(6): 832-836.
|
[9] |
SHEN Li-Hong, XU Zhen.
Electronic cash based on trusted computing platform
[J]. , 2009, 26(5): 712-719.
|
[10] |
WU Jing-Jing, JING Ji-Wu, WANG Yue-Wu, LIN Jing-Qiang, Liu Yi-Cong.
Trust model for Public Key Infrastructure in the real-world environment
[J]. , 2009, 26(3): 389-399.
|
[11] |
GUO Li-Feng, LI Yong, HU Lei.
Cryptanalysis of a signature scheme without using one-way Hash functions
[J]. Journal of University of Chinese Academy of Sciences, 2008, 25(5): 698-700.
|
[12] |
ZHOU Su-Jing, LIN Dong-Dai.
Comments on an efficient group signature scheme
[J]. , 2007, 24(3): 316-319.
|
[13] |
CAO Zheng-Jun.
On the untraceability of two group signatures
[J]. , 2007, 24(2): 253-256.
|
[14] |
ZHANG Peng-Cheng, WU Chuan-Kun.
Cryptananlysis of an Anonymity-revoking Blind Proxy Signature Scheme
[J]. Journal of University of Chinese Academy of Sciences, 2006, 23(6): 833-836.
|
[15] |
CAI Mian,KANG Li.
A Secure Multiple Grade Proxy Signature Scheme
[J]. , 2006, 23(5): 653-659.
|