[1] |
WANG Jie, CHEN Zhigang, LIU Jialing, CHENG Hongbing.
Privacy Behavior Mining Technology for Cloud Computing Based on Clustering
[J]. Computer Engineering and Applications, 2020, 56(5): 80-84.
|
[2] |
LI Mengte, GU Chunhua, WEN Mi.
Secure Charging Transaction Data Storage Platform Based on Blockchain
[J]. Computer Engineering and Applications, 2020, 56(21): 79-84.
|
[3] |
SUN Dandan1,2, LUO Yonglong1,2, FAN Guoting1,2, GUO Liangmin1,2, ZHENG Xiaoyao1,2.
Location privacy-preserving method against attacks under P2P communication
[J]. Computer Engineering and Applications, 2018, 54(9): 75-83.
|
[4] |
WANG Jie1,2, CHEN Zhigang1, QIAN Manyun3, CHENG Hongbing3.
5A accountability modeling towards privacy-preserving for cloud computing
[J]. Computer Engineering and Applications, 2018, 54(17): 24-29.
|
[5] |
XU Xiaosheng1, JIN Ping2, ZHENG Wen2.
Recognition of indoor chair wireframe
[J]. Computer Engineering and Applications, 2016, 52(23): 196-202.
|
[6] |
XIA Chao1, ZHONG Hong1,2, SHI Runhua1,2.
Secure multi-party multiplication protocol based on homomorphic encryption technology
[J]. Computer Engineering and Applications, 2015, 51(1): 76-80.
|
[7] |
FU Tianyu1,2, LUO Yonglong1,2, GUO Liangmin1,2, SUN Lingling1,2.
Privacy preserving calculating intersection area of two polygons
[J]. Computer Engineering and Applications, 2014, 50(9): 37-40.
|
[8] |
WU Fen1, ZHONG Hong1,2, SHI Runhua1,2.
Privacy-preserving computation protocol for fermat problem’s extreme values
[J]. Computer Engineering and Applications, 2014, 50(4): 77-80.
|
[9] |
LU Hong1,LIAO Longlong2.
Privacy-preserving model of LBS in Internet of Things
[J]. Computer Engineering and Applications, 2014, 50(15): 91-96.
|
[10] |
HE Kang1, LI Mengxing2, ZHAO Jian1, FENG Quan1.
Fingercode based remote fingerprint authentication scheme using homomorphic encryption
[J]. Computer Engineering and Applications, 2013, 49(24): 78-82.
|
[11] |
WU Tao1, HUANG Lijing2.
Improved privacy-preserving collaborative filtering recommendation algorithm between systems
[J]. Computer Engineering and Applications, 2013, 49(15): 80-83.
|
[12] |
SUN Lingling1,2, LUO Yonglong1,2, GUO Liangmin1,2, SUN Liping1,2.
Accumulated score trust model based on reputation
[J]. Computer Engineering and Applications, 2012, 48(27): 69-73.
|
[13] |
ZHONG Hong1,2,SUN Yanfei2,YAN Feifei2,HUANG Hongsheng2.
Protocol for privacy-preserving space closest-pair of points
[J]. Computer Engineering and Applications, 2011, 47(4): 87-89.
|
[14] |
DAI Haipeng,TANG Houjun.
Improved algorithm for computing diameter of convex polygons
[J]. Computer Engineering and Applications, 2011, 47(3): 44-46.
|
[15] |
WANG Pingshui1,MA Qinjuan2.
Research on k-anonymity algorithm for privacy preservation
[J]. Computer Engineering and Applications, 2011, 47(28): 117-119.
|