[1] |
REN Miaomiao, PAN Zhuo, XU Xianghui, SU Haitao.
Very high resolution (VHR) SAR image simulation for buildings
[J]. , 2018, 35(6): 788-794.
|
[2] |
JIA Shijie, XIA Luning, WEN Nan.
Signature private key generation method based on the physical properties of Nand Flash and its applications
[J]. , 2015, 32(5): 695-700.
|
[3] |
ZHANG Yan, ZHANG Liwu, ZHANG Moli.
Efficient attribute-based signature with constant signature size
[J]. , 2015, 32(5): 708-713.
|
[4] |
ZHANG Mingqing, ZHANG Can, CHEN Deyuan, ZHANG Kenan.
A mobile classification security method for SMS based on Android system
[J]. , 2015, 32(2): 281-287.
|
[5] |
HUANG Gui-Fang, HU Lei.
Statistically binding non-interactive non-mallebale commitment
[J]. , 2013, 30(2): 264-271.
|
[6] |
WEI Yun, XIONG Guo-Hua, ZHANG Xing-Kai, BAO Wan-Su.
A strong blind signature scheme over the braid groups
[J]. , 2011, 28(6): 826-831.
|
[7] |
SHEN Li-Hong, XU Zhen.
Electronic cash based on trusted computing platform
[J]. , 2009, 26(5): 712-719.
|
[8] |
GUO Li-Feng, LI Yong, HU Lei.
Cryptanalysis of a signature scheme without using one-way Hash functions
[J]. Journal of University of Chinese Academy of Sciences, 2008, 25(5): 698-700.
|
[9] |
ZHOU Su-Jing, LIN Dong-Dai.
Comments on an efficient group signature scheme
[J]. , 2007, 24(3): 316-319.
|
[10] |
CAO Zheng-Jun.
On the untraceability of two group signatures
[J]. , 2007, 24(2): 253-256.
|
[11] |
BI Yu, GAO Hu-Ming.
An Off-line Interest Countable Electronic Cash Scheme
[J]. Journal of University of Chinese Academy of Sciences, 2006, 23(6): 802-807.
|
[12] |
ZHANG Peng-Cheng, WU Chuan-Kun.
Cryptananlysis of an Anonymity-revoking Blind Proxy Signature Scheme
[J]. Journal of University of Chinese Academy of Sciences, 2006, 23(6): 833-836.
|
[13] |
CAI Mian,KANG Li.
A Secure Multiple Grade Proxy Signature Scheme
[J]. , 2006, 23(5): 653-659.
|
[14] |
DU Hong-Zhen, LI Yan-Ping, ZHANG Jian-Zhong.
An Optimistic Fair Non-Repudiation Protocol with Semi-Trusted Third Party
[J]. , 2006, 23(3): 377-381.
|
[15] |
Cao Zheng-Jun.
Two Remarks on a Forword-Secure E-cash System
[J]. , 2006, 23(3): 403-406.
|