[1] |
WEI Jihong, ZHENG Rongfeng, LIU Jiayong.
Research on Malicious TLS Traffic Identification Based on Hybrid Neural Network
[J]. Computer Engineering and Applications, 2021, 57(7): 107-114.
|
[2] |
LI Ling, WANG Zheng, LI Na.
Access Control Scheme Supporting Computing Outsourcing in Fog Computing
[J]. Computer Engineering and Applications, 2021, 57(6): 81-87.
|
[3] |
WEI Lifei, LI Mengsi, ZHANG Lei, CHEN Congcong, CHEN Yujiao, WANG Qin.
Privacy-Preserving Linear Regression Algorithm Based on Secure Two-Party Computation
[J]. Computer Engineering and Applications, 2021, 57(22): 139-146.
|
[4] |
WANG Hairui, XIANYU Jianchuan.
Application of Distributed Generation Configuration Based on Improved Sparrow Search Algorithm
[J]. Computer Engineering and Applications, 2021, 57(20): 245-252.
|
[5] |
LIAO Liefa, YANG Hong.
Review of Beetle Antennae Search
[J]. Computer Engineering and Applications, 2021, 57(12): 54-64.
|
[6] |
YU Bo, TAI Xianqing, MA Zhijie.
Study on Attribute and Trust-Based RBAC Model in Cloud Computing
[J]. Computer Engineering and Applications, 2020, 56(9): 84-92.
|
[7] |
JIANG Jiao, CAI Linqin, WEI Pengcheng, LI Li.
Aretrieval Scheme Supporting Verifiable Ciphertext Fuzzy Keyword
[J]. Computer Engineering and Applications, 2020, 56(7): 74-80.
|
[8] |
SONG Xiuli, ZHOU Daoyang, CAO Yunfan.
Design and Simulation of [d]dimensional Quantum Homomorphic Encryption Algorithm
[J]. Computer Engineering and Applications, 2020, 56(7): 109-115.
|
[9] |
PENG Weiping, GUO Kaidi, SONG Cheng, YAN Xixi.
Traceable Leak Prevention Access Control Scheme for Outsourced Data
[J]. Computer Engineering and Applications, 2020, 56(6): 117-125.
|
[10] |
NIE Mengfei, PANG Xiaoqiong, CHEN Wenjun, GONG Shiming, YANG Ting.
Fair Searchable Encryption Scheme Based on Ethereum Blockchain
[J]. Computer Engineering and Applications, 2020, 56(4): 69-75.
|
[11] |
HAN Bang, LI Zichen, TANG Yongli.
Design and Implementation of Full Text Retrieval Scheme Based on Homomorphic Encryption
[J]. Computer Engineering and Applications, 2020, 56(21): 103-107.
|
[12] |
LI Shuang.
Certificateless Public Key Encryption with Keyword Search
[J]. Computer Engineering and Applications, 2020, 56(20): 93-97.
|
[13] |
Gulmire ARKEN, Nurmamat HELIL.
CP-ABE Re-encryption Based Access Control Constraint for Sensitive Data
[J]. Computer Engineering and Applications, 2020, 56(18): 69-76.
|
[14] |
LIANG Yanli, LING Jie.
Encrypted Data Sharing Scheme in Cloud Storage Based on Blockchain
[J]. Computer Engineering and Applications, 2020, 56(17): 41-47.
|
[15] |
SHI Yuqing, LING Jie.
Traceable Attribute-Based Encryption with Hidden Access Policies
[J]. Computer Engineering and Applications, 2020, 56(16): 75-83.
|