[1] |
SONG Guochao, CHU Guanghui, WU Shaoxin.
Location Privacy Protection Approach Based on Interval Region
[J]. Computer Engineering and Applications, 2020, 56(8): 66-73.
|
[2] |
XU Jian, WEN Mi, ZHANG Kai.
Improved [K]-Anonymous Incentive Mechanism Scheme Combined with Blockchain Technology
[J]. Computer Engineering and Applications, 2020, 56(6): 111-116.
|
[3] |
GUAN Wei1, ZHANG Lei2.
PSO Attributes Clustering for Preserving Location Privacy
[J]. Computer Engineering and Applications, 2019, 55(5): 96-104.
|
[4] |
SONG Xuewen, LV Xin, WANG Xinyuan.
Grid-Based Location Privacy Protection Method in Hybrid Architecture
[J]. Computer Engineering and Applications, 2019, 55(23): 92-98.
|
[5] |
DENG Fei1, ZHU Ying2.
Anonymous authenticated key agreement protocol with provable security
[J]. Computer Engineering and Applications, 2018, 54(5): 101-104.
|
[6] |
LI Chenglong, LV Xin, LI Xin.
Dynamic K-anonymity algorithm for resisting prediction attack based on historical trajectories
[J]. Computer Engineering and Applications, 2018, 54(2): 119-124.
|
[7] |
ZHANG Weizhe, GAO Dezhi, LI Yan.
Hidden identity ring signature scheme using ECC
[J]. Computer Engineering and Applications, 2017, 53(23): 88-90.
|
[8] |
ZHOU Ketao, LIU Weiguo, SHI Ronghua.
K-degree anonymity scheme for preserving privacy based on similarity of neighborhood degree sequence
[J]. Computer Engineering and Applications, 2017, 53(19): 102-108.
|
[9] |
YI Ting, DU Weizhang.
Forward secure threshold proxy signature scheme with designated verifier
[J]. Computer Engineering and Applications, 2017, 53(10): 101-106.
|
[10] |
GUO Xudong, WU Yingjie, YANG Wenjin, WANG Xiaodong.
l-diversity algorithm for privacy preserving trajectory data publishing
[J]. Computer Engineering and Applications, 2015, 51(2): 125-130.
|
[11] |
ZHAO Hongbin, MA Zhiqiang, YIN Guisheng, HAN Qilong.
Location anonymity method of mobile objects continuous query
[J]. Computer Engineering and Applications, 2015, 51(12): 5-9.
|
[12] |
WANG Jianye1, REN Ping’an1, WU Zhenqiang1, LI Yanping2.
Anonymous communication mechanism based on coding-confusion
[J]. Computer Engineering and Applications, 2014, 50(23): 108-113.
|
[13] |
YANG Yiqian, YUAN Jiabin.
Research on incredible users cooperate constructing anonymous region in LBS
[J]. Computer Engineering and Applications, 2014, 50(14): 82-87.
|
[14] |
LV Pin1,2,3, ZHONG Luo1, YU Wenbing3, HE Chengwan2,3.
MA-Datafly:k-anonymity approaches for supporting multi-attribute generalization
[J]. Computer Engineering and Applications, 2013, 49(4): 138-140.
|
[15] |
WU Hongwei1,2, ZHANG Jianpei1, YANG Jing1.
Novel bipartite graph anonymous method based on k-frequent subgraph clustering
[J]. Computer Engineering and Applications, 2013, 49(17): 18-23.
|