[1] |
YUAN Chenjuan, SUN Guozi, LI Huakang, WANG Jitao.
Credible Depository Chain System of Card Games
[J]. Journal of Applied Sciences, 2020, 38(1): 81-92.
|
[2] |
ZHANG Lihua, HU Fangzhou, HUANG Yang, WAN Yuanhua, LI Jingjing.
Identity Authentication Protocol of Micro-grid Power Based on Consortium Blockchain
[J]. Journal of Applied Sciences, 2020, 38(1): 173-183.
|
[3] |
ZHAO Yunying, SHAO Liping, WANG Yang, LU Hai.
Improved Generation Camouflage Method Combined with Block Rotation and Photo Mosaic
[J]. Journal of Applied Sciences, 2019, 37(5): 673-690.
|
[4] |
XU Mengqi, Lü Donghui, REN Yanli.
Tagged Visual Cryptography Scheme Based on XOR Decryption
[J]. Journal of Applied Sciences, 2019, 37(4): 469-480.
|
[5] |
LÜ Jing-shu, CAO Xiao-chun, YANG Pei.
Two-Factor Identity Authentication Model Based on Blockchain and Face Recognition
[J]. Journal of Applied Sciences, 2019, 37(2): 164-178.
|
[6] |
ZHAO Ling-qi, SONG Yu-bo, ZHANG Ke-luo, HU Ai-qun, LUO Jian.
Logistics Information Privacy Protection Based on Blockchain and Hierarchical Encryption
[J]. Journal of Applied Sciences, 2019, 37(2): 224-234.
|
[7] |
LI Na, CHEN Fu, MAO Guo-jun, ZHU Jian-ming, HUANG Yong-feng.
Anti-phone Harassment Fraud Model Based on Blockchain
[J]. Journal of Applied Sciences, 2019, 37(2): 235-243.
|
[8] |
YUAN Hong-lin, LU Xiao-dan, XU Chen.
Estimation of Broadband Communication Transmitter Fingerprints Based on B-Spline Neural Network
[J]. Journal of Applied Sciences, 2019, 37(1): 12-23.
|
[9] |
HU Man, LÜ Dong-hui, REN Yan-li.
Improved Color Image Encryption Algorithm Based on Quaternion Rotation
[J]. Journal of Applied Sciences, 2018, 36(4): 601-610.
|
[10] |
HE Zhi-hong, QIN Chuan, ZHOU Qing.
High-Capacity Reversible Data Hiding for Encrypted Images
[J]. Journal of Applied Sciences, 2018, 36(4): 611-627.
|
[11] |
CHEN Yan, YU Chun-qiang, HOU Xiao-jie, ZHANG Xian-quan, TANG Zhen-jun, HE Nan.
Reversible Information Hiding Method in Encrypted Image Based on Surface Interpolation
[J]. Journal of Applied Sciences, 2018, 36(2): 220-236.
|
[12] |
DENG Min, CHEN Fan, HE Hong-jie, YAN Shu.
Analysis and Improvement of a Reversible Hiding Algorithm in Encrypted Domain
[J]. Journal of Applied Sciences, 2018, 36(2): 267-277.
|
[13] |
LÜ Li-qun, YANG Xiao-yuan, WANG Jing-jing, CHENG Lu.
Low Overhead Broadcast Encryption with Personalized Message Based on Multilinear Maps
[J]. Journal of Applied Sciences, 2017, 35(5): 626-633.
|
[14] |
PENG Shan, LONG Min.
Region-Selected Image Encryption with Combination of DNA Coding and Chaos
[J]. Journal of Applied Sciences, 2015, 33(6): 655-662.
|
[15] |
XIN Xin, QIAN Zhen-xing, ZHANG Xin-peng, DAI Shu.
Tripartite Trade System Based on Secure Watermarking
[J]. Journal of Applied Sciences, 2015, 33(6): 575-584.
|