[1] |
Shuangxing WANG, Jintang LUO, Lisha SHUAI, Jiamin ZHANG, Min ZHANG, Xiaolong YANG.
Cloud data anonymous assured deletion approach based on blockchain
[J]. Telecommunications Science, 2021, 37(3): 90-104.
|
[2] |
Dongliang GUAN.
Service platform architecture reconstruction based on microservices
[J]. Telecommunications Science, 2020, 36(9): 75-83.
|
[3] |
Wenbin CHENG,Jia LIU.
Realization of smart home key management mechanism based on ECC
[J]. Telecommunications Science, 2017, 33(6): 121-128.
|
[4] |
Jie ZHAO,Huarong ZHANG.
Security authentication protocol based on elliptic curve cryptography and cookie information for terminal of IoT
[J]. Telecommunications Science, 2016, 32(6): 136-142.
|
[5] |
Yuehui CHEN,Miao HUANG.
Anonymous security authentication scheme using elliptic curve cryptography and hash function in mobile network
[J]. Telecommunications Science, 2016, 32(5): 114-120.
|
[6] |
Wumei ZHANG.
RFID security authentication scheme based on Montgomery-form elliptic curve cryptography
[J]. Telecommunications Science, 2016, 32(5): 121-126.
|
[7] |
Songtao PANG.
Network authentication technology based on public key system
[J]. Telecommunications Science, 2016, 32(2): 170-174.
|
[8] |
Bo Hu,Binfeng Yan,Jianshu Qiu,Shuanghe Dong.
Research on SIM Card-Based Mobile Digital Signature and Authentication for Financial Services
[J]. Telecommunications Science, 2015, 31(6): 12-17.
|
[9] |
Xie Mande and Zhang Guoping.
XSeluge: A Secure Online Code Dissemination
Algorithm Based on Network Code
[J]. Telecommunications Science, 2012, 28(11): 74-80.
|
[10] |
Zhang Jun.
Quantum Proxy Signature Scheme with EPR Entangled States
[J]. Telecommunications Science, 2012, 28(11): 92-97.
|
[11] |
Chengyuan Song,Chuanrong Zhang,Shuai Cao,Jingyi Bai.
A Batch Veifiable ID-Based Blind Signature Scheme
[J]. Telecommunications Science, 2011, 27(7): 90-94.
|
[12] |
Jun Feng,Yu Pan,Xu Chen.
Security Problems of CDA Mechanism and Its Solutions
[J]. Telecommunications Science, 2011, 27(5): 72-76.
|
[13] |
Shanxue Chen,Xiaofeng Yao,Shuxian Zhou,Fangwei Li.
A Micro-Payment Protocol Used for 3G Mobile Scheme
[J]. Telecommunications Science, 2011, 27(3): 60-64.
|
[14] |
Hongbo Guan,Xiangjun Xin,Xueshao Qiu.
Research and Advance of Verifiably Encrypted Signature Schemes
[J]. Telecommunications Science, 2010, 26(7): 94-98.
|
[15] |
Jun Zhang.
Security Analysis of Structured Multi-Signature Scheme and Its Improvement
[J]. Telecommunications Science, 2010, 26(10): 52-55.
|