[1] |
XU Xiaosheng1, JIN Ping2, ZHENG Wen2.
Recognition of indoor chair wireframe
[J]. Computer Engineering and Applications, 2016, 52(23): 196-202.
|
[2] |
XIA Chao1, ZHONG Hong1,2, SHI Runhua1,2.
Secure multi-party multiplication protocol based on homomorphic encryption technology
[J]. Computer Engineering and Applications, 2015, 51(1): 76-80.
|
[3] |
FU Tianyu1,2, LUO Yonglong1,2, GUO Liangmin1,2, SUN Lingling1,2.
Privacy preserving calculating intersection area of two polygons
[J]. Computer Engineering and Applications, 2014, 50(9): 37-40.
|
[4] |
WU Fen1, ZHONG Hong1,2, SHI Runhua1,2.
Privacy-preserving computation protocol for fermat problem’s extreme values
[J]. Computer Engineering and Applications, 2014, 50(4): 77-80.
|
[5] |
WU Tao1, HUANG Lijing2.
Improved privacy-preserving collaborative filtering recommendation algorithm between systems
[J]. Computer Engineering and Applications, 2013, 49(15): 80-83.
|
[6] |
SUN Lingling1,2, LUO Yonglong1,2, GUO Liangmin1,2, SUN Liping1,2.
Accumulated score trust model based on reputation
[J]. Computer Engineering and Applications, 2012, 48(27): 69-73.
|
[7] |
ZHONG Hong1,2,SUN Yanfei2,YAN Feifei2,HUANG Hongsheng2.
Protocol for privacy-preserving space closest-pair of points
[J]. Computer Engineering and Applications, 2011, 47(4): 87-89.
|
[8] |
DAI Haipeng,TANG Houjun.
Improved algorithm for computing diameter of convex polygons
[J]. Computer Engineering and Applications, 2011, 47(3): 44-46.
|
[9] |
LI He1,WANG Shu-yang2.
Several secure two-party protocols of division
[J]. Computer Engineering and Applications, 2010, 46(6): 86-88.
|
[10] |
FU Zu-feng1,LUO Wen-jun2,TONG Ling1.
Protocol for privacy-preserving intersect-determination of line segment and elliptical
[J]. Computer Engineering and Applications, 2010, 46(17): 77-80.
|
[11] |
WANG Hong-yan1,LIU Run-tao2,WANG San1.
New algorithm to calculate kernel of simple polygon
[J]. Computer Engineering and Applications, 2010, 46(17): 166-168.
|
[12] |
WANG Ting,LUO Wen-jun.
Privacy-preserving determination protocol for point-line distance and position relation based on threshold
[J]. Computer Engineering and Applications, 2010, 46(13): 87-89.
|
[13] |
JU Wen-qi1,2,3,LUO Jun2.
New algorithms for convex hull of maximum area based on parallel line segment
[J]. Computer Engineering and Applications, 2010, 46(1): 154-159.
|
[14] |
LU Shao-feng1,2,LUO Yong-long1,2,3.
Privacy-preserving signed distance protocol
[J]. Computer Engineering and Applications, 2009, 45(33): 77-80.
|
[15] |
ZHANG Chun-sheng1,YAO Shao-wen2,WANG Shi-pu2.
Cryptanalysis of (M+1)-st auction scheme
[J]. Computer Engineering and Applications, 2009, 45(11): 111-113.
|