[1] |
XIE Jia, HU Yupu, GAO Juntao, WANG Baocang, JIANG Mingming.
Forward Secure Sequential Aggregate Signature Schemes on Lattice
[J]. Journal of Frontiers of Computer Science and Technology, 2021, 15(9): 1658-1666.
|
[2] |
WANG Yali, ZHAI Yanhui, ZHANG Shaoxia, JIA Nan, LI Deyu.
Study of Implication Representation Based on Decision Implication
[J]. Journal of Frontiers of Computer Science and Technology, 2021, 15(7): 1322-1331.
|
[3] |
XU Jilin, XU Jianfeng, LIU Long, WU Fangwen.
Research on Drift Calculation of Concept Lattice for Sliding Window Method
[J]. Journal of Frontiers of Computer Science and Technology, 2021, 15(6): 1145-1154.
|
[4] |
ZHANG Mingjun, YANG Sihua, YAO Bing.
Exploring Relationship Between Traditional Lattices and Graph Lattices of Topological Coding
[J]. Journal of Frontiers of Computer Science and Technology, 2021, 15(11): 2171-2183.
|
[5] |
XIE Jia, HU Yupu, GAO Juntao, WANG Baocang, JIANG Mingming.
Forward Secure Lattice-Based Sequential Aggregate Signature Schemes in Stan-dard Model
[J]. Journal of Frontiers of Computer Science and Technology, 2021, 15(10): 1912-1920.
|
[6] |
SHI Nini, FAN Yan, WEI Ling.
Description of Common Characters in Conflict Analysis via GOE-Concept Lattices
[J]. Journal of Frontiers of Computer Science and Technology, 2020, 14(5): 870-879.
|
[7] |
YU Jinxia, YANG Chaochao, ZHANG Qichao, YAN Xixi.
Revocable Ciphertext-Policy Attribute-Based Encryption in Data Outsourcing Systems from Lattices
[J]. Journal of Frontiers of Computer Science and Technology, 2020, 14(2): 244-251.
|
[8] |
CHEN Hong, HUANG Jie, CHEN Honglin, WANG Runting, XIAO Chenglong, GUO Pengfei, JIN Haibo.
Identity-Based Matrix (Level) Fully Homomorphic Encryption Scheme
[J]. Journal of Frontiers of Computer Science and Technology, 2020, 14(10): 1702-1711.
|
[9] |
YAN Mengyu, LI Jinhai.
Research on Relationship Between Common and Unique Attributes (Objects) of Concept Lattice
[J]. Journal of Frontiers of Computer Science and Technology, 2019, 13(4): 702-710.
|
[10] |
SUN Ziwen, LI Song.
Lightweight Authentication Protocol for Location Privacy Using PUF in Mobile RFID System
[J]. Journal of Frontiers of Computer Science and Technology, 2019, 13(3): 418-428.
|
[11] |
ZHANG Miao, ZHOU Yu, CHEN Jianhai, HE Qinming, XU Shun, GONG Ming.
Analysis and MPI Implementation of LQCD Dslash on Sunway TaihuLight
[J]. Journal of Frontiers of Computer Science and Technology, 2019, 13(10): 1664-1676.
|
[12] |
HE Xiaoli, WEI Ling, QIAN Ting.
Property Oriented Interval-Set Concept Lattice
[J]. Journal of Frontiers of Computer Science and Technology, 2018, 12(9): 1506-1512.
|
[13] |
WANG Ping, ZHOU Zhiping, LI Jing.
Improved Server-less RFID Security Authentication Protocol
[J]. Journal of Frontiers of Computer Science and Technology, 2018, 12(7): 1117-1125.
|
[14] |
WANG Sheng, XIE Hui, ZHANG Fuquan.
Semi-Fragile Image Watermarking Algorithm by Using Edge Detection and Zernike Invariant Moments
[J]. Journal of Frontiers of Computer Science and Technology, 2018, 12(4): 629-641.
|
[15] |
ZENG Licheng, ZHANG Zuping, ZOU Ligeng.
Fast Algorithm for Incremental Construction of Concept Lattice
[J]. Journal of Frontiers of Computer Science and Technology, 2018, 12(11): 1862-1870.
|