[1] |
XU Xiaoyuan, LI Haibo, HUANG Li.
Convex Optimization Analysis of Joint Delay Tail Probability of Multi-heterogeneous Files in Cloud Storage
[J]. Computer Engineering and Applications, 2021, 57(5): 88-94.
|
[2] |
WU Bo, LIU Yi.
Data Deduplication Scheme with Dynamic Ownership Management Based on RCE in Cloud Storage
[J]. Computer Engineering and Applications, 2020, 56(5): 101-108.
|
[3] |
SI Haifei, SHI Zhen, HU Xingliu, YANG Chunping.
Research on Speed Optimization of Image Semantic Segmentation Based on Deeplab V3 Model
[J]. Computer Engineering and Applications, 2020, 56(24): 137-143.
|
[4] |
HAN Bang, LI Zichen, TANG Yongli.
Design and Implementation of Full Text Retrieval Scheme Based on Homomorphic Encryption
[J]. Computer Engineering and Applications, 2020, 56(21): 103-107.
|
[5] |
LIANG Yanli, LING Jie.
Encrypted Data Sharing Scheme in Cloud Storage Based on Blockchain
[J]. Computer Engineering and Applications, 2020, 56(17): 41-47.
|
[6] |
LI Yanjun, WANG Shubei, YANG Xiaotong, CAO Yisen.
Lightweight NFC Security Authentication Scheme Based on Mobile Terminal
[J]. Computer Engineering and Applications, 2020, 56(16): 84-89.
|
[7] |
ZHANG Guipeng, KUANG Zhenxi, CHEN Pinghua.
Cloud Storage Deduplication Scheme Using Signature and Hash Technology
[J]. Computer Engineering and Applications, 2020, 56(1): 76-82.
|
[8] |
TIAN Hua1, YAN Xiai2, YANG Jinmin3.
Adaptive Fault Tolerance Schemes for Cloud Storage of Library
[J]. Computer Engineering and Applications, 2019, 55(7): 95-99.
|
[9] |
YUAN Ying, ZHU Hongliang, CHEN Yuling, OUYANG Zhi, XIN Yang, YANG Yixian.
Survey of Data Integrity Verification Technology Based on Provable Data Possession
[J]. Computer Engineering and Applications, 2019, 55(18): 1-7.
|
[10] |
LIU Yi, WANG Pingyan.
Secure Data Deduplication Scheme Based on Storage Gateway
[J]. Computer Engineering and Applications, 2019, 55(17): 112-116.
|
[11] |
LIU Zhusong, HE Zhe.
Deduplication with encrypted data based on Merkle Hash tree in cloud storage
[J]. Computer Engineering and Applications, 2018, 54(5): 85-90.
|
[12] |
WANG Tianqi, PANG Xiaoqiong, REN Mengqi.
Batch remote data integrity checking protocol with corrupted data location
[J]. Computer Engineering and Applications, 2018, 54(4): 90-97.
|
[13] |
REN Mengqi, PANG Xiaoqiong, WANG Tianqi, NIE Mengfei.
Data integrity checking scheme with privacy protecting in multi-cloud storage
[J]. Computer Engineering and Applications, 2018, 54(22): 60-66.
|
[14] |
YIN Qinqin.
Secure deduplication approach based on Bloom Filter in hybrid cloud storage environments
[J]. Computer Engineering and Applications, 2018, 54(10): 73-80.
|
[15] |
SU Di, LIU Zhusong.
New type of Merkle Hash Tree for integrity audit scheme in cloud storage
[J]. Computer Engineering and Applications, 2018, 54(1): 70-76.
|