[1] |
ZHU Zhishen,LING Jie,LIN Peng.
Data Integrity Checking Technology of Industrial Control System Based on Covert Channel
[J]. Computer Engineering and Applications, 2020, 56(9): 125-130.
|
[2] |
AN Ning, JIANG Siyuan, TANG Chen, YANG Jiaoyun.
Clustering Method by Combining Simplex Mapping and Entropy Weighting
[J]. Computer Engineering and Applications, 2020, 56(9): 148-155.
|
[3] |
LIU Liwei1, SUN Jianzhi1, TAN Li1, YANG Bin2.
Research on Trusted Authentication Method of Network Device Based on IMC/IMV
[J]. Computer Engineering and Applications, 2019, 55(9): 79-86.
|
[4] |
YUAN Ying, ZHU Hongliang, CHEN Yuling, OUYANG Zhi, XIN Yang, YANG Yixian.
Survey of Data Integrity Verification Technology Based on Provable Data Possession
[J]. Computer Engineering and Applications, 2019, 55(18): 1-7.
|
[5] |
WANG Tianqi, PANG Xiaoqiong, REN Mengqi.
Batch remote data integrity checking protocol with corrupted data location
[J]. Computer Engineering and Applications, 2018, 54(4): 90-97.
|
[6] |
REN Mengqi, PANG Xiaoqiong, WANG Tianqi, NIE Mengfei.
Data integrity checking scheme with privacy protecting in multi-cloud storage
[J]. Computer Engineering and Applications, 2018, 54(22): 60-66.
|
[7] |
SU Di, LIU Zhusong.
New type of Merkle Hash Tree for integrity audit scheme in cloud storage
[J]. Computer Engineering and Applications, 2018, 54(1): 70-76.
|
[8] |
JIA Zongpu, WANG Guanqiong, PENG Weiping, GUO Hairu.
Energy-saving privacy preserving aggregation scheme with integrity verification support
[J]. Computer Engineering and Applications, 2017, 53(5): 116-120.
|
[9] |
YAN Yawei, ZHOU Yanzhou, HUI Wentao.
Research on application of model checking in integrity formal verification
[J]. Computer Engineering and Applications, 2017, 53(4): 59-63.
|
[10] |
XU Bihan1,2, ZHENG Dong1,2, REN Fang1,2.
Coding homomorphic hashing based provable data possession
[J]. Computer Engineering and Applications, 2017, 53(21): 91-97.
|
[11] |
CHEN Zhengyu1, DAI Hua2, YE Qingqun2, WANG Min2, GE Ningling2.
Survey of secure range query processing in two-tiered Wireless Sensor Networks
[J]. Computer Engineering and Applications, 2017, 53(19): 26-32.
|
[12] |
LI Shiyang, WANG Xiaoming.
Multi-user verifying completeness and integrity encrypted keyword query in cloud storage
[J]. Computer Engineering and Applications, 2016, 52(7): 132-138.
|
[13] |
LU Yang, GAO Bao.
Research on file integrity checking based on CityHash for e-government websites
[J]. Computer Engineering and Applications, 2016, 52(4): 104-109.
|
[14] |
MA Liang, QIAN Xuezhong.
Research on critical path of Web service call based on trusted computing
[J]. Computer Engineering and Applications, 2016, 52(3): 230-235.
|
[15] |
SHANG Yuling, PENG Caijun.
Crosstalk delay faults test based on SAT
[J]. Computer Engineering and Applications, 2016, 52(15): 38-42.
|