[1] |
SONG Guochao, CHU Guanghui, WU Shaoxin.
Location Privacy Protection Approach Based on Interval Region
[J]. Computer Engineering and Applications, 2020, 56(8): 66-73.
|
[2] |
XU Jian, WEN Mi, ZHANG Kai.
Improved [K]-Anonymous Incentive Mechanism Scheme Combined with Blockchain Technology
[J]. Computer Engineering and Applications, 2020, 56(6): 111-116.
|
[3] |
GUAN Wei1, ZHANG Lei2.
PSO Attributes Clustering for Preserving Location Privacy
[J]. Computer Engineering and Applications, 2019, 55(5): 96-104.
|
[4] |
SONG Xuewen, LV Xin, WANG Xinyuan.
Grid-Based Location Privacy Protection Method in Hybrid Architecture
[J]. Computer Engineering and Applications, 2019, 55(23): 92-98.
|
[5] |
ZENG Chunyan1, WANG Zhifeng2, WANG Jing2, TIAN Yuan2, YE Junmin3, ZUO Mingzhang2.
Survey of Passive Detection of Digital Audio Tampering
[J]. Computer Engineering and Applications, 2019, 55(2): 1-11.
|
[6] |
LI Chenglong, LV Xin, LI Xin.
Dynamic K-anonymity algorithm for resisting prediction attack based on historical trajectories
[J]. Computer Engineering and Applications, 2018, 54(2): 119-124.
|
[7] |
HE Zhangqing1, LI Hong2, WAN Meilin3, WU Tiezhou1.
Authentication and session key exchange protocol based on Physical Uncolonable Function
[J]. Computer Engineering and Applications, 2018, 54(18): 17-21.
|
[8] |
ZHAO Bo1,2, LI Erhui1,2, MA Jun1,2, HUANG Yuqing1,2.
Security-enhanced key generation scheme based on USB Key
[J]. Computer Engineering and Applications, 2018, 54(10): 135-142.
|
[9] |
DENG Fei1, ZHU Ying2.
Novel one-round certificateless group authenticated key agreement protocol
[J]. Computer Engineering and Applications, 2017, 53(5): 111-115.
|
[10] |
ZHANG Weizhe, GAO Dezhi, LI Yan.
Hidden identity ring signature scheme using ECC
[J]. Computer Engineering and Applications, 2017, 53(23): 88-90.
|
[11] |
ZHOU Ketao, LIU Weiguo, SHI Ronghua.
K-degree anonymity scheme for preserving privacy based on similarity of neighborhood degree sequence
[J]. Computer Engineering and Applications, 2017, 53(19): 102-108.
|
[12] |
YI Ting, DU Weizhang.
Forward secure threshold proxy signature scheme with designated verifier
[J]. Computer Engineering and Applications, 2017, 53(10): 101-106.
|
[13] |
WANG Min, LIU Dan, WEI Mingfei, WANG Chun.
Research on authenticity identification algorithm of Chinese painting based on region
[J]. Computer Engineering and Applications, 2016, 52(24): 162-165.
|
[14] |
GUO Xudong, WU Yingjie, YANG Wenjin, WANG Xiaodong.
l-diversity algorithm for privacy preserving trajectory data publishing
[J]. Computer Engineering and Applications, 2015, 51(2): 125-130.
|
[15] |
ZHAO Hongbin, MA Zhiqiang, YIN Guisheng, HAN Qilong.
Location anonymity method of mobile objects continuous query
[J]. Computer Engineering and Applications, 2015, 51(12): 5-9.
|