Citation: | ZHANG Xian-feng, ZHANG Feng, QIN Zhi-guang, LIU Jin-de. ECC Based Threshold Decryption Scheme and Its Application in Web Security[J]. Journal of Electronic Science and Technology, 2004, 2(4): 41-46. |
[1] | Chi-Shiang Chan, Yi-Hui Chen, Yuan-Yu Tsai. Guest Editorial:Special Issue on Information Security and Applications[J]. Journal of Electronic Science and Technology, 2017, 15(3): 209-210. DOI: 10.11989/JEST.1674-862X.60804019 |
[2] | Xiang Liu, Zhi-Guang Qin, Jie Shen. Mobile Web Middleware of NFC Context-Awareness Applications[J]. Journal of Electronic Science and Technology, 2013, 11(4): 388-392. DOI: 10.3969/j.issn.1674-862X.2013.04.010 |
[3] | Chin-Fu Kuo, Yung-Feng Lu, Chi-Ying Chen. Security-State Adjustable Gateway with Threat-Based Configuration[J]. Journal of Electronic Science and Technology, 2013, 11(2): 140-149. DOI: 10.3969/j.issn.1674-862X.2013.02.005 |
[4] | Chin-Chen Chang, Ming-Shiang Hwang. Special Issue on Network and Communication Security[J]. Journal of Electronic Science and Technology, 2012, 10(3): 193-194. DOI: 10.3969/j.issn.1674-862X.2012.03.001 |
[5] | Bing Zhang, Xin-Xin Ma, Zhi-Guang Qin. Security Architecture on the Trusting Internet of Things[J]. Journal of Electronic Science and Technology, 2011, 9(4): 364-367. DOI: 10.3969/j.issn.1674-862X.2011.04.014 |
[6] | Chin-Chen Chang, Chia-Chen Lin. Guest Editorial: Special Issue on Information Security[J]. Journal of Electronic Science and Technology, 2011, 9(4): 289-290. DOI: 10.3969/j.issn.1674-862X.2011.04.001 |
[7] | Lun Cai, Jing-Ling Liu, Xi Wang. Implementation Method of Non-Intrusive Monitoring Mechanism for Web Services Testing[J]. Journal of Electronic Science and Technology, 2009, 7(3): 207-213. |
[8] | FEI Chun, TANG Xue-fei. Research on the E-Learning Application of Web Service[J]. Journal of Electronic Science and Technology, 2005, 3(3): 218-221. |
[9] | QIN Zhiguang, LUO Xucheng, GAO Rong. A Survey of E-Commerce Security[J]. Journal of Electronic Science and Technology, 2004, 2(3): 173-176,199. |
[10] | LUO Huiqiong, WANG Jiahao, ZHAO Qiang. On an Interactive Network Security Measure[J]. Journal of Electronic Science and Technology, 2004, 2(1): 35-37. |