[1] |
YANG Quan.
SVM Algorithm for N1+N2 Structure Syntax Relation Determination
[J]. Computer Engineering and Applications, 2021, 57(20): 104-108.
|
[2] |
YU Bo, TAI Xianqing, MA Zhijie.
Study on Attribute and Trust-Based RBAC Model in Cloud Computing
[J]. Computer Engineering and Applications, 2020, 56(9): 84-92.
|
[3] |
WU Bo, LIU Yi.
Data Deduplication Scheme with Dynamic Ownership Management Based on RCE in Cloud Storage
[J]. Computer Engineering and Applications, 2020, 56(5): 101-108.
|
[4] |
Gulmire ARKEN, Nurmamat HELIL.
CP-ABE Re-encryption Based Access Control Constraint for Sensitive Data
[J]. Computer Engineering and Applications, 2020, 56(18): 69-76.
|
[5] |
ZHENG Zupeng, WANG Zumin, PENG Yang, JI Changqing, QIN Jing.
Survey of MAC Protocols for Energy Harvesting Sensor Networks
[J]. Computer Engineering and Applications, 2020, 56(15): 24-29.
|
[6] |
YIN Longxiao, WU Zhongdong.
Revocation Control Scheme in CP-ABE
[J]. Computer Engineering and Applications, 2020, 56(13): 100-105.
|
[7] |
GAO Jian, WANG An.
Research on Ontology-Based Network Threat Intelligence Analysis Technology
[J]. Computer Engineering and Applications, 2020, 56(11): 112-117.
|
[8] |
LI Jinhai, HE Youshi, MA Yunlei, ZHOU Aiping.
Research of Universal Model for Knowledge Representation Based on Multi-layer Domain Ontology
[J]. Computer Engineering and Applications, 2020, 56(11): 149-155.
|
[9] |
WANG Jingyu, LUAN Junqing, TAN Yuesheng.
Research on Big Data Access Control Model Based on Data Sensitivity
[J]. Computer Engineering and Applications, 2019, 55(23): 70-77.
|
[10] |
CHEN Lu, WANG Ze.
Access Control Scheme Based on ATP-ABE
[J]. Computer Engineering and Applications, 2019, 55(2): 79-85.
|
[11] |
TAN Yuesheng, LU Liming, WANG Jingyu.
Ciphertext-Policy Attribute Encryption Scheme Based on Homomorphic Encryption
[J]. Computer Engineering and Applications, 2019, 55(19): 115-120.
|
[12] |
WANG Siyu, HE Jingsha, TENG Da.
Access Control System Supporting Quantification and Protection of Privacy Information
[J]. Computer Engineering and Applications, 2019, 55(16): 77-87.
|
[13] |
QU Hanhua1, HUI Jianzhong1, HE Xianfeng2, WANG Muhua1, HE Xiaofeng1, FENG De’en1.
Formal concept analysis model of meteorological services
[J]. Computer Engineering and Applications, 2018, 54(9): 257-264.
|
[14] |
YOU Yun1,2,3, WAN Changxuan1,3, CHEN Huangye1,3.
Diversified commodity recommendation method considering correlation between objects
[J]. Computer Engineering and Applications, 2018, 54(7): 70-76.
|
[15] |
XU Guoyu, MIAO Xuna, ZHANG Junfeng, JIANG Tao, MA Xiaofei.
Review of implicit authentication for mobile devices
[J]. Computer Engineering and Applications, 2018, 54(6): 19-25.
|