[1] |
WEI Jihong, ZHENG Rongfeng, LIU Jiayong.
Research on Malicious TLS Traffic Identification Based on Hybrid Neural Network
[J]. Computer Engineering and Applications, 2021, 57(7): 107-114.
|
[2] |
LI Ling, WANG Zheng, LI Na.
Access Control Scheme Supporting Computing Outsourcing in Fog Computing
[J]. Computer Engineering and Applications, 2021, 57(6): 81-87.
|
[3] |
PAN Shupeng, LIU Youyao, JIAO Jiye, LI Zhao.
Research and Design of FPU Based on RISC-V Floating Point Instruction Set
[J]. Computer Engineering and Applications, 2021, 57(3): 80-86.
|
[4] |
WEI Lifei, LI Mengsi, ZHANG Lei, CHEN Congcong, CHEN Yujiao, WANG Qin.
Privacy-Preserving Linear Regression Algorithm Based on Secure Two-Party Computation
[J]. Computer Engineering and Applications, 2021, 57(22): 139-146.
|
[5] |
FENG Kai, LI Jing.
Subnetwork Reliability of k-Ary n-Cube Networks
[J]. Computer Engineering and Applications, 2021, 57(16): 83-89.
|
[6] |
YU Bo, TAI Xianqing, MA Zhijie.
Study on Attribute and Trust-Based RBAC Model in Cloud Computing
[J]. Computer Engineering and Applications, 2020, 56(9): 84-92.
|
[7] |
JIANG Jiao, CAI Linqin, WEI Pengcheng, LI Li.
Aretrieval Scheme Supporting Verifiable Ciphertext Fuzzy Keyword
[J]. Computer Engineering and Applications, 2020, 56(7): 74-80.
|
[8] |
SONG Xiuli, ZHOU Daoyang, CAO Yunfan.
Design and Simulation of [d]dimensional Quantum Homomorphic Encryption Algorithm
[J]. Computer Engineering and Applications, 2020, 56(7): 109-115.
|
[9] |
PENG Weiping, GUO Kaidi, SONG Cheng, YAN Xixi.
Traceable Leak Prevention Access Control Scheme for Outsourced Data
[J]. Computer Engineering and Applications, 2020, 56(6): 117-125.
|
[10] |
NIE Mengfei, PANG Xiaoqiong, CHEN Wenjun, GONG Shiming, YANG Ting.
Fair Searchable Encryption Scheme Based on Ethereum Blockchain
[J]. Computer Engineering and Applications, 2020, 56(4): 69-75.
|
[11] |
HAN Bang, LI Zichen, TANG Yongli.
Design and Implementation of Full Text Retrieval Scheme Based on Homomorphic Encryption
[J]. Computer Engineering and Applications, 2020, 56(21): 103-107.
|
[12] |
HAO Zhenhe, JIAO Jiye, LI Yuqian.
Design and Implementation of RISC-V Microprocessor Based on AHB Bus
[J]. Computer Engineering and Applications, 2020, 56(20): 52-58.
|
[13] |
LI Shuang.
Certificateless Public Key Encryption with Keyword Search
[J]. Computer Engineering and Applications, 2020, 56(20): 93-97.
|
[14] |
Gulmire ARKEN, Nurmamat HELIL.
CP-ABE Re-encryption Based Access Control Constraint for Sensitive Data
[J]. Computer Engineering and Applications, 2020, 56(18): 69-76.
|
[15] |
LIANG Yanli, LING Jie.
Encrypted Data Sharing Scheme in Cloud Storage Based on Blockchain
[J]. Computer Engineering and Applications, 2020, 56(17): 41-47.
|