[1] |
WEI Lifei, LI Mengsi, ZHANG Lei, CHEN Congcong, CHEN Yujiao, WANG Qin.
Privacy-Preserving Linear Regression Algorithm Based on Secure Two-Party Computation
[J]. Computer Engineering and Applications, 2021, 57(22): 139-146.
|
[2] |
SONG Xiuli, ZHOU Daoyang, CAO Yunfan.
Design and Simulation of [d]dimensional Quantum Homomorphic Encryption Algorithm
[J]. Computer Engineering and Applications, 2020, 56(7): 109-115.
|
[3] |
TAN Yuesheng, LU Liming, WANG Jingyu.
Ciphertext-Policy Attribute Encryption Scheme Based on Homomorphic Encryption
[J]. Computer Engineering and Applications, 2019, 55(19): 115-120.
|
[4] |
LIU Yudong, WANG Xu’an, GAO Zhongshi.
Euclidean Distance Outsourcing Computation Protocol Based on Homomorphic Encryption Algorithm
[J]. Computer Engineering and Applications, 2019, 55(15): 110-116.
|
[5] |
ZHANG Sijia1, GU Chunhua2, WEN Mi1.
Analysis and Research on Data Aggregation Scheme in Smart Grid
[J]. Computer Engineering and Applications, 2019, 55(12): 83-89.
|
[6] |
XIANG Guangli, LI Ankang, LIN Xiang, XIONG Bin.
Multiple keywords retrieval scheme based on homomorphic encryption
[J]. Computer Engineering and Applications, 2018, 54(2): 97-101.
|
[7] |
FU Tianyu1,2, LUO Yonglong1,2, GUO Liangmin1,2, SUN Lingling1,2.
Privacy preserving calculating intersection area of two polygons
[J]. Computer Engineering and Applications, 2014, 50(9): 37-40.
|
[8] |
LU Hong1,LIAO Longlong2.
Privacy-preserving model of LBS in Internet of Things
[J]. Computer Engineering and Applications, 2014, 50(15): 91-96.
|
[9] |
ZHU Huahong, HE Qianhua, LI Yanxiong, PAN Weiqiang.
Homomorphic encryption scheme based voiceprint template design and analysis
[J]. Computer Engineering and Applications, 2014, 50(13): 15-20.
|
[10] |
HE Kang1, LI Mengxing2, ZHAO Jian1, FENG Quan1.
Fingercode based remote fingerprint authentication scheme using homomorphic encryption
[J]. Computer Engineering and Applications, 2013, 49(24): 78-82.
|
[11] |
GU Chunsheng1,2, JING Zhengjun1,3, YU Zhimin1.
Breaking faster fully homomorphic encryption scheme over integer
[J]. Computer Engineering and Applications, 2013, 49(21): 101-105.
|
[12] |
WU Tao1, HUANG Lijing2.
Improved privacy-preserving collaborative filtering recommendation algorithm between systems
[J]. Computer Engineering and Applications, 2013, 49(15): 80-83.
|
[13] |
TANG Dianhua, ZHU Shixiong, CAO Yunfei.
Faster fully homomorphic encryption scheme over integer
[J]. Computer Engineering and Applications, 2012, 48(28): 117-122.
|
[14] |
SUN Lingling1,2, LUO Yonglong1,2, GUO Liangmin1,2, SUN Liping1,2.
Accumulated score trust model based on reputation
[J]. Computer Engineering and Applications, 2012, 48(27): 69-73.
|
[15] |
ZHONG Hong1,2,SUN Yanfei2,YAN Feifei2,HUANG Hongsheng2.
Protocol for privacy-preserving space closest-pair of points
[J]. Computer Engineering and Applications, 2011, 47(4): 87-89.
|