[1] |
WEI Lifei, LI Mengsi, ZHANG Lei, CHEN Congcong, CHEN Yujiao, WANG Qin.
Privacy-Preserving Linear Regression Algorithm Based on Secure Two-Party Computation
[J]. Computer Engineering and Applications, 2021, 57(22): 139-146.
|
[2] |
SONG Xiuli, ZHOU Daoyang, CAO Yunfan.
Design and Simulation of [d]dimensional Quantum Homomorphic Encryption Algorithm
[J]. Computer Engineering and Applications, 2020, 56(7): 109-115.
|
[3] |
WANG Jie, CHEN Zhigang, LIU Jialing, CHENG Hongbing.
Privacy Behavior Mining Technology for Cloud Computing Based on Clustering
[J]. Computer Engineering and Applications, 2020, 56(5): 80-84.
|
[4] |
LI Mengte, GU Chunhua, WEN Mi.
Secure Charging Transaction Data Storage Platform Based on Blockchain
[J]. Computer Engineering and Applications, 2020, 56(21): 79-84.
|
[5] |
TAN Yuesheng, LU Liming, WANG Jingyu.
Ciphertext-Policy Attribute Encryption Scheme Based on Homomorphic Encryption
[J]. Computer Engineering and Applications, 2019, 55(19): 115-120.
|
[6] |
LIU Yudong, WANG Xu’an, GAO Zhongshi.
Euclidean Distance Outsourcing Computation Protocol Based on Homomorphic Encryption Algorithm
[J]. Computer Engineering and Applications, 2019, 55(15): 110-116.
|
[7] |
ZHANG Sijia1, GU Chunhua2, WEN Mi1.
Analysis and Research on Data Aggregation Scheme in Smart Grid
[J]. Computer Engineering and Applications, 2019, 55(12): 83-89.
|
[8] |
SUN Dandan1,2, LUO Yonglong1,2, FAN Guoting1,2, GUO Liangmin1,2, ZHENG Xiaoyao1,2.
Location privacy-preserving method against attacks under P2P communication
[J]. Computer Engineering and Applications, 2018, 54(9): 75-83.
|
[9] |
XIANG Guangli, LI Ankang, LIN Xiang, XIONG Bin.
Multiple keywords retrieval scheme based on homomorphic encryption
[J]. Computer Engineering and Applications, 2018, 54(2): 97-101.
|
[10] |
WANG Jie1,2, CHEN Zhigang1, QIAN Manyun3, CHENG Hongbing3.
5A accountability modeling towards privacy-preserving for cloud computing
[J]. Computer Engineering and Applications, 2018, 54(17): 24-29.
|
[11] |
XIA Chao1, ZHONG Hong1,2, SHI Runhua1,2.
Secure multi-party multiplication protocol based on homomorphic encryption technology
[J]. Computer Engineering and Applications, 2015, 51(1): 76-80.
|
[12] |
FU Tianyu1,2, LUO Yonglong1,2, GUO Liangmin1,2, SUN Lingling1,2.
Privacy preserving calculating intersection area of two polygons
[J]. Computer Engineering and Applications, 2014, 50(9): 37-40.
|
[13] |
WU Fen1, ZHONG Hong1,2, SHI Runhua1,2.
Privacy-preserving computation protocol for fermat problem’s extreme values
[J]. Computer Engineering and Applications, 2014, 50(4): 77-80.
|
[14] |
LU Hong1,LIAO Longlong2.
Privacy-preserving model of LBS in Internet of Things
[J]. Computer Engineering and Applications, 2014, 50(15): 91-96.
|
[15] |
ZHU Huahong, HE Qianhua, LI Yanxiong, PAN Weiqiang.
Homomorphic encryption scheme based voiceprint template design and analysis
[J]. Computer Engineering and Applications, 2014, 50(13): 15-20.
|