Citation: | MEIQi-xiang, HEDa-ke, ZHENG Yu. New Threshold Cryptosystem againstChosen C iphertextAttacks Based on Pairing[J]. Journal of Southwest Jiaotong University, 2005, 18(6): 727-730. |
[1] | WANG Zengqiang, PU Yun. Selection in Product Plan Alternatives Based on PPHoQ and Stochastic Variable[J]. Journal of Southwest Jiaotong University, 2022, 57(4): 776-782. doi: 10.3969/j.issn.0258-2724.20210027 |
[2] | LIU Hui, LI Hui, MA Zhanxin. Efficient and Secure Authentication Scheme for Vehicular Ad Hoc Networks[J]. Journal of Southwest Jiaotong University, 2011, 24(2): 315-520. doi: 10.3969/j.issn.0258-2724.2011.02.023 |
[3] | YU Wangke, MA Wenping, CHEN Hefeng. Key Management Scheme for Clustered Wireless Sensor Networks[J]. Journal of Southwest Jiaotong University, 2011, 24(2): 310-314. doi: 10.3969/j.issn.0258-2724.2011.02.022 |
[4] | GUO Qiang, GUO Yaohuang, GUO Chunxiang. Alternative Ranking Based on Fuzzy Similarityin Group Decision-Making[J]. Journal of Southwest Jiaotong University, 2010, 23(2): 307-311. doi: 10. 3969/ j. issn. 0258-2724. |
[5] | CHEN Chong-Shuang, WANG Ci-Guang, JIAN Bing-Yi. Improved Count Method of Train Sorting Schemes[J]. Journal of Southwest Jiaotong University, 2010, 23(4): 615-620. doi: 10. 3969/ j. issn. 0258-2724. |
[6] | YANG Wenfeng, HU Yupu, GAO Juntao. Key Recovery Attack on Stream Cipher Grain v1 and Its Improvement[J]. Journal of Southwest Jiaotong University, 2010, 23(5): 745-750. doi: 10. 3969/ j. issn. 0258-2724. |
[7] | LIU Li, PENG Daiyuan, LI Xiaoju. Adaptive Video Watermarking Scheme for Effective Resistance to Linear Collusion in Spatial Domain[J]. Journal of Southwest Jiaotong University, 2007, 20(4): 456-460. |
[8] | CHI Maoru, ZHANG Weihua, DAI Huanyun. Steering Behaviors of Coupled Bogie with Independent Wheels[J]. Journal of Southwest Jiaotong University, 2007, 20(6): 695-700. |
[9] | ZHANG Wenfang, HE Dake, WANG Hongxia, WANG Xiaomin. Conspiracy Attack Immune(t,n) Threshold Signature Scheme with Traceability[J]. Journal of Southwest Jiaotong University, 2007, 20(4): 461-467. |
[10] | ZHANG Xueyuan, WU Guangning, DENG Mingli, GAO Bo. Scheme for Naturally Passing Neutral Sections of High Speed Railways[J]. Journal of Southwest Jiaotong University, 2007, 20(6): 680-684,690. |
[11] | YUAN Ding, FAN Pingzhi. Nonrepudiable Threshold Proxy Signature Scheme Based on Elliptic Curve Cryptography[J]. Journal of Southwest Jiaotong University, 2007, 20(1): 8-12. |
[12] | WANG Da-yong, MEIZhi-hong, JINWei-dong. Security Scheme forM obile Agent inM aliciousHosts[J]. Journal of Southwest Jiaotong University, 2005, 18(4): 505-509. |
[13] | YISi-rong, ZHANGJia-ling, DENG Yu-cai. An Automatic Optimization Method for Designing the Initial Horizontal Alignment of New Railway Lines[J]. Journal of Southwest Jiaotong University, 2002, 15(1): 1-4. |
[14] | ZHANG Wei-hua, MEIGui-ming, HUANGLi-xiang. A Study on Electromechanical Actuator for Tilting Trains[J]. Journal of Southwest Jiaotong University, 2000, 13(6): 661-665. |
[15] | ZHAO Qiang. Optimal Model and Algorithm for Feasibility of Station Arrival-Departure Requirement of Train Operation Plan[J]. Journal of Southwest Jiaotong University, 2000, 13(2): 196-200. |