[1] |
MEN Jiawei, LAI Chengzhe.
Trust Management Scheme with Incentive Mechanism for Cooperative Download of Internet of Vehicles
[J]. Computer Engineering and Applications, 2021, 57(5): 100-106.
|
[2] |
ZOU Jianwen, ZHAO Bo, LI Xiang, LIU Yifan, LI Jiayue.
tPUF-Based Security Access Scheme for IoT Devices
[J]. Computer Engineering and Applications, 2021, 57(2): 119-126.
|
[3] |
GU Junhua, CHEN Bo, WANG Rui, ZHANG Suqi.
Social Recommendation Combined with Important Nodes Trust Propagation
[J]. Computer Engineering and Applications, 2021, 57(17): 190-195.
|
[4] |
YU Bo, TAI Xianqing, MA Zhijie.
Study on Attribute and Trust-Based RBAC Model in Cloud Computing
[J]. Computer Engineering and Applications, 2020, 56(9): 84-92.
|
[5] |
WU Bo, LIU Yi.
Data Deduplication Scheme with Dynamic Ownership Management Based on RCE in Cloud Storage
[J]. Computer Engineering and Applications, 2020, 56(5): 101-108.
|
[6] |
ZHANG Jin, SUN Fuzhen, WANG Shaoqing, WANG Shuai, LU Xiangzhi.
POI Recommendation Algorithm with Fusing Social Relation and Geographical Information
[J]. Computer Engineering and Applications, 2020, 56(5): 173-178.
|
[7] |
DENG Xiaohong, ZHU Nianhong, HUANG Lei, WANG Zhiqiang, WANG Junbin.
Research on Identity Trusteeship Model Based on Blockchain
[J]. Computer Engineering and Applications, 2020, 56(4): 24-30.
|
[8] |
GU Mingxing, HUANG Weijian, HUANG Yuan, SHENG Long, SHEN Chao, ZHANG Mengtian.
Collaborative Filtering Recommendation Combining Attribute Clustering and Improving User Similarity
[J]. Computer Engineering and Applications, 2020, 56(22): 185-190.
|
[9] |
Gulmire ARKEN, Nurmamat HELIL.
CP-ABE Re-encryption Based Access Control Constraint for Sensitive Data
[J]. Computer Engineering and Applications, 2020, 56(18): 69-76.
|
[10] |
HAO Yuchen, LIU Chen.
Research on Evolution of Views of Network Community Based on Media Intervention and User Trust
[J]. Computer Engineering and Applications, 2020, 56(16): 156-164.
|
[11] |
ZHENG Zupeng, WANG Zumin, PENG Yang, JI Changqing, QIN Jing.
Survey of MAC Protocols for Energy Harvesting Sensor Networks
[J]. Computer Engineering and Applications, 2020, 56(15): 24-29.
|
[12] |
YIN Longxiao, WU Zhongdong.
Revocation Control Scheme in CP-ABE
[J]. Computer Engineering and Applications, 2020, 56(13): 100-105.
|
[13] |
YU Lianglong, DU Weizhang.
Secret Sharing Scheme Based on Symmetric Bivariate Polynomial
[J]. Computer Engineering and Applications, 2020, 56(13): 120-123.
|
[14] |
SHI Hui, CAI Yueming, YANG Weiwei, XIANG Zhongwu, CHEN Dechuan.
Secure Performance Analysis on Untrusted Relay Network with TSR over Nakagami-[m] Channel
[J]. Computer Engineering and Applications, 2020, 56(12): 98-104.
|
[15] |
LIU Liwei1, SUN Jianzhi1, TAN Li1, YANG Bin2.
Research on Trusted Authentication Method of Network Device Based on IMC/IMV
[J]. Computer Engineering and Applications, 2019, 55(9): 79-86.
|