| [1] |
BAI Jianfeng, MIAO Fuyou.
Constructing Ideal [(t,k,n)] Tightly Coupled Secret Sharing Scheme
[J]. Computer Engineering and Applications, 2021, 57(3): 125-129.
|
| [2] |
WEI Lifei, LI Mengsi, ZHANG Lei, CHEN Congcong, CHEN Yujiao, WANG Qin.
Privacy-Preserving Linear Regression Algorithm Based on Secure Two-Party Computation
[J]. Computer Engineering and Applications, 2021, 57(22): 139-146.
|
| [3] |
CHENG Yage, HU Mingsheng, GONG Bei, WANG Lipeng, XU Erfeng.
Dynamic Threshold Signature Scheme with Strong Forward Security
[J]. Computer Engineering and Applications, 2020, 56(5): 125-134.
|
| [4] |
HUANG Dongmei, ZHANG Xuejian, WEI Lifei, LI Mengsi, SU Cheng.
Secure Outsourced Denoising Scheme in Remote Sensing Images on Multi-cloud Architecture
[J]. Computer Engineering and Applications, 2020, 56(22): 92-99.
|
| [5] |
YU Lianglong, DU Weizhang.
Secret Sharing Scheme Based on Symmetric Bivariate Polynomial
[J]. Computer Engineering and Applications, 2020, 56(13): 120-123.
|
| [6] |
SONG Xiuli1,2, XU Jiankun1,2.
(t,n) Threshold Quantum Secret Sharing Based on d-Dimensional Multi-Particle Entanglement State
[J]. Computer Engineering and Applications, 2019, 55(5): 89-95.
|
| [7] |
LIU Haifeng, XUE Chao, LIANG Xingliang.
Threshold Scheme Based on Bivariate Lagrange Interpolation Polynomial
[J]. Computer Engineering and Applications, 2019, 55(17): 107-111.
|
| [8] |
HAO Na, LI Zhihui, BAI Haiyan.
Secret sharing scheme in 9-dimensional quantum system
[J]. Computer Engineering and Applications, 2018, 54(22): 107-112.
|
| [9] |
FANG Liang1, LIU Fengnian2, MIAO Fuyou1.
Group key negotiate scheme based on secret sharing
[J]. Computer Engineering and Applications, 2018, 54(12): 69-73.
|
| [10] |
ZHANG Benhui1, TANG Yuansheng2.
Two perfect threshold changeable multi-secret sharing schemes
[J]. Computer Engineering and Applications, 2017, 53(5): 24-27.
|
| [11] |
CHENG Siting, TAN Xiaoqing.
Quantum secret sharing scheme based on cluster states
[J]. Computer Engineering and Applications, 2016, 52(21): 140-145.
|
| [12] |
JI Yangyang, MIAO Fuyou, JIANG Huiwen.
Simple asynchronous [(t,m,n)] group authentication
[J]. Computer Engineering and Applications, 2016, 52(15): 8-12.
|
| [13] |
GU Weiyu, MIAO Fuyou, HE Xiaoting.
Fair secret sharing scheme based on symmetric bivariate polynomial
[J]. Computer Engineering and Applications, 2016, 52(13): 38-42.
|
| [14] |
LI Zhihui, YANG Lijie.
Optimal information rate of hypergraph access structures on five participants
[J]. Computer Engineering and Applications, 2015, 51(8): 109-112.
|
| [15] |
CHEN Jinguang1,2, SUN Rui1, MA Lili1.
Post-processing algorithm for GM-CPHD filter based on track-estimate association
[J]. Computer Engineering and Applications, 2015, 51(8): 189-194.
|