[1] |
SONG Guochao, CHU Guanghui, WU Shaoxin.
Location Privacy Protection Approach Based on Interval Region
[J]. Computer Engineering and Applications, 2020, 56(8): 66-73.
|
[2] |
XU Jian, WEN Mi, ZHANG Kai.
Improved [K]-Anonymous Incentive Mechanism Scheme Combined with Blockchain Technology
[J]. Computer Engineering and Applications, 2020, 56(6): 111-116.
|
[3] |
GUAN Wei1, ZHANG Lei2.
PSO Attributes Clustering for Preserving Location Privacy
[J]. Computer Engineering and Applications, 2019, 55(5): 96-104.
|
[4] |
SONG Xuewen, LV Xin, WANG Xinyuan.
Grid-Based Location Privacy Protection Method in Hybrid Architecture
[J]. Computer Engineering and Applications, 2019, 55(23): 92-98.
|
[5] |
XIAO Meihua, LI Wei, LI Yanan, MEI Yingtian.
Security communication framework of DICOM protocol based on PACS cloud
[J]. Computer Engineering and Applications, 2018, 54(7): 107-113.
|
[6] |
DENG Fei1, ZHU Ying2.
Anonymous authenticated key agreement protocol with provable security
[J]. Computer Engineering and Applications, 2018, 54(5): 101-104.
|
[7] |
LI Chenglong, LV Xin, LI Xin.
Dynamic K-anonymity algorithm for resisting prediction attack based on historical trajectories
[J]. Computer Engineering and Applications, 2018, 54(2): 119-124.
|
[8] |
ZHANG Weizhe, GAO Dezhi, LI Yan.
Hidden identity ring signature scheme using ECC
[J]. Computer Engineering and Applications, 2017, 53(23): 88-90.
|
[9] |
ZHOU Ketao, LIU Weiguo, SHI Ronghua.
K-degree anonymity scheme for preserving privacy based on similarity of neighborhood degree sequence
[J]. Computer Engineering and Applications, 2017, 53(19): 102-108.
|
[10] |
YI Ting, DU Weizhang.
Forward secure threshold proxy signature scheme with designated verifier
[J]. Computer Engineering and Applications, 2017, 53(10): 101-106.
|
[11] |
ZHANG Gang, SHI Runhua, ZHONG Hong.
Anonymous authentication scheme based on identity in VANET
[J]. Computer Engineering and Applications, 2016, 52(17): 101-106.
|
[12] |
DENG Fei1, ZHU Ying2.
Mutual password-based client/server authentication protocol
[J]. Computer Engineering and Applications, 2015, 51(20): 72-76.
|
[13] |
GUO Xudong, WU Yingjie, YANG Wenjin, WANG Xiaodong.
l-diversity algorithm for privacy preserving trajectory data publishing
[J]. Computer Engineering and Applications, 2015, 51(2): 125-130.
|
[14] |
ZHAO Hongbin, MA Zhiqiang, YIN Guisheng, HAN Qilong.
Location anonymity method of mobile objects continuous query
[J]. Computer Engineering and Applications, 2015, 51(12): 5-9.
|
[15] |
WANG Jianye1, REN Ping’an1, WU Zhenqiang1, LI Yanping2.
Anonymous communication mechanism based on coding-confusion
[J]. Computer Engineering and Applications, 2014, 50(23): 108-113.
|