[1] |
WANG Di, LI Caihong, GUO Na, LIU Guoming, GAO Tengteng.
Local Path Planning of Mobile Robot Based on Fuzzy Potential Field Method
[J]. Computer Engineering and Applications, 2021, 57(6): 212-218.
|
[2] |
YU Bo, TAI Xianqing, MA Zhijie.
Study on Attribute and Trust-Based RBAC Model in Cloud Computing
[J]. Computer Engineering and Applications, 2020, 56(9): 84-92.
|
[3] |
WU Bo, LIU Yi.
Data Deduplication Scheme with Dynamic Ownership Management Based on RCE in Cloud Storage
[J]. Computer Engineering and Applications, 2020, 56(5): 101-108.
|
[4] |
Gulmire ARKEN, Nurmamat HELIL.
CP-ABE Re-encryption Based Access Control Constraint for Sensitive Data
[J]. Computer Engineering and Applications, 2020, 56(18): 69-76.
|
[5] |
ZHENG Zupeng, WANG Zumin, PENG Yang, JI Changqing, QIN Jing.
Survey of MAC Protocols for Energy Harvesting Sensor Networks
[J]. Computer Engineering and Applications, 2020, 56(15): 24-29.
|
[6] |
YIN Longxiao, WU Zhongdong.
Revocation Control Scheme in CP-ABE
[J]. Computer Engineering and Applications, 2020, 56(13): 100-105.
|
[7] |
CHEN Bengang, SONG Lipeng.
Malicious Webpage Detection Method for Webpage Content Link Hierarchy Semantic Tree
[J]. Computer Engineering and Applications, 2020, 56(11): 90-97.
|
[8] |
SHI Xiaobo, LIN Suzhen, SANG Xinya.
Restoring Method of Defects Based on Continuous Patch of Structure and Multi-Scale Transform
[J]. Computer Engineering and Applications, 2019, 55(8): 189-194.
|
[9] |
HUANG Simeng1, CHENG Lianglun2, WANG Tao2.
Multi-Pattern Complex Event Detection Method Based on Double-Array Trie-Tree
[J]. Computer Engineering and Applications, 2019, 55(4): 91-95.
|
[10] |
WANG Yuqi, LIU Bowen, LIN Guoyuan.
Phishing Detection Algorithm Based on Language Features of URL
[J]. Computer Engineering and Applications, 2019, 55(24): 84-90.
|
[11] |
WANG Jingyu, LUAN Junqing, TAN Yuesheng.
Research on Big Data Access Control Model Based on Data Sensitivity
[J]. Computer Engineering and Applications, 2019, 55(23): 70-77.
|
[12] |
CHEN Lu, WANG Ze.
Access Control Scheme Based on ATP-ABE
[J]. Computer Engineering and Applications, 2019, 55(2): 79-85.
|
[13] |
TAN Yuesheng, LU Liming, WANG Jingyu.
Ciphertext-Policy Attribute Encryption Scheme Based on Homomorphic Encryption
[J]. Computer Engineering and Applications, 2019, 55(19): 115-120.
|
[14] |
WANG Siyu, HE Jingsha, TENG Da.
Access Control System Supporting Quantification and Protection of Privacy Information
[J]. Computer Engineering and Applications, 2019, 55(16): 77-87.
|
[15] |
XU Guoyu, MIAO Xuna, ZHANG Junfeng, JIANG Tao, MA Xiaofei.
Review of implicit authentication for mobile devices
[J]. Computer Engineering and Applications, 2018, 54(6): 19-25.
|