1. Bai, Y. (2019). Personal privacy protection in cloud computing environment. Network security technology and Application (12), 86-88. https://docdown.cnki.net/docdown
2. Cheng, Y., Hu, M., & Bei, G. Wang, L., & Xu, E. (2020). Dynamic threshold signature scheme with strong forward security. Computer engineering and Application, (05), 125-134. https://kns.cnki.net/kcms/detail/
3. Cloud based private data analytic using secure computation over encrypted data
4. Secure Timestamp-Based Mutual Authentication Protocol for IoT Devices Using RFID Tags
5. Han, L. (2021). Research and application of Geji ring signature [Master's thesis, Northwest Normal University].https://kns.cnki.net/KCMS/detail/