[1] |
SONG Guochao, CHU Guanghui, WU Shaoxin.
Location Privacy Protection Approach Based on Interval Region
[J]. Computer Engineering and Applications, 2020, 56(8): 66-73.
|
[2] |
XU Jian, WEN Mi, ZHANG Kai.
Improved [K]-Anonymous Incentive Mechanism Scheme Combined with Blockchain Technology
[J]. Computer Engineering and Applications, 2020, 56(6): 111-116.
|
[3] |
ZHAI Sheping, CHEN Siji, WANG Yijing.
Research on Digital Copyright Storage System Model Based on Blockchain
[J]. Computer Engineering and Applications, 2020, 56(19): 13-21.
|
[4] |
GUAN Wei1, ZHANG Lei2.
PSO Attributes Clustering for Preserving Location Privacy
[J]. Computer Engineering and Applications, 2019, 55(5): 96-104.
|
[5] |
SONG Xuewen, LV Xin, WANG Xinyuan.
Grid-Based Location Privacy Protection Method in Hybrid Architecture
[J]. Computer Engineering and Applications, 2019, 55(23): 92-98.
|
[6] |
DENG Fei1, ZHU Ying2.
Anonymous authenticated key agreement protocol with provable security
[J]. Computer Engineering and Applications, 2018, 54(5): 101-104.
|
[7] |
LI Chenglong, LV Xin, LI Xin.
Dynamic K-anonymity algorithm for resisting prediction attack based on historical trajectories
[J]. Computer Engineering and Applications, 2018, 54(2): 119-124.
|
[8] |
GE Lixia1, LI Xiao1, HE Mingxing2, LI Yarong1, LIU Xiaojian2.
Improved certificateless proxy signature scheme
[J]. Computer Engineering and Applications, 2017, 53(8): 92-94.
|
[9] |
ZHANG Weizhe, GAO Dezhi, LI Yan.
Hidden identity ring signature scheme using ECC
[J]. Computer Engineering and Applications, 2017, 53(23): 88-90.
|
[10] |
ZHOU Ketao, LIU Weiguo, SHI Ronghua.
K-degree anonymity scheme for preserving privacy based on similarity of neighborhood degree sequence
[J]. Computer Engineering and Applications, 2017, 53(19): 102-108.
|
[11] |
YI Ting, DU Weizhang.
Forward secure threshold proxy signature scheme with designated verifier
[J]. Computer Engineering and Applications, 2017, 53(10): 101-106.
|
[12] |
TIAN Juanhong, ZHANG Jianzhong, LI Yanping.
Robust multi-proxy multi-blind signature scheme
[J]. Computer Engineering and Applications, 2017, 53(1): 130-133.
|
[13] |
ZOU Changzhi.
Identity-based multi-proxy signature without bilinear pairings
[J]. Computer Engineering and Applications, 2016, 52(9): 96-101.
|
[14] |
ZHANG Jiao, HE Yong, LI Xiong.
Cryptanalysis and improvement of two verifiable ring signature schemes
[J]. Computer Engineering and Applications, 2016, 52(8): 115-119.
|
[15] |
MI Junli1, ZHANG Jianzhong2, CHEN Shouting1, LIU Fenghua1.
Leakage-resilient designated verifier blind proxy signature scheme
[J]. Computer Engineering and Applications, 2016, 52(22): 123-126.
|