[1] |
ZHOU Liang, YING Huan, DAI Bo, QIU Yimin.
Security and Efficient Biometric Identification Outsourcing Scheme
[J]. Computer Engineering and Applications, 2020, 56(1): 127-135.
|
[2] |
GUAN Wei1, ZHANG Lei2.
PSO Attributes Clustering for Preserving Location Privacy
[J]. Computer Engineering and Applications, 2019, 55(5): 96-104.
|
[3] |
JIA Zongpu, WANG Guanqiong, PENG Weiping, GUO Hairu.
Energy-saving privacy preserving aggregation scheme with integrity verification support
[J]. Computer Engineering and Applications, 2017, 53(5): 116-120.
|
[4] |
CHEN Zhengyu1, DAI Hua2, YE Qingqun2, WANG Min2, GE Ningling2.
Survey of secure range query processing in two-tiered Wireless Sensor Networks
[J]. Computer Engineering and Applications, 2017, 53(19): 26-32.
|
[5] |
LI Shiyang, WANG Xiaoming.
Multi-user verifying completeness and integrity encrypted keyword query in cloud storage
[J]. Computer Engineering and Applications, 2016, 52(7): 132-138.
|
[6] |
WANG Maohua1, HAO Yunli2, CHU Yawei2.
Data encryption method based on privacy preserving
[J]. Computer Engineering and Applications, 2014, 50(23): 87-90.
|
[7] |
LV Pin1,2,3, ZHONG Luo1, YU Wenbing3, HE Chengwan2,3.
MA-Datafly:k-anonymity approaches for supporting multi-attribute generalization
[J]. Computer Engineering and Applications, 2013, 49(4): 138-140.
|
[8] |
ZHANG Shun, CHEN Haijin.
Defending RFID authentication protocol against malicious attacks
[J]. Computer Engineering and Applications, 2012, 48(25): 112-117.
|
[9] |
WANG Shenghe1, WANG Jiajun2, LIU Tengteng2, NI Weiwei2.
Privacy-preserving data publishing method for dataset with multi-dimensional sensitive attributes
[J]. Computer Engineering and Applications, 2012, 48(20): 136-141.
|
[10] |
LIN Rui, ZHONG Cheng, LI Xiaolu.
Cross multi-table frequent itemsets mining with privacy preserving
[J]. Computer Engineering and Applications, 2012, 48(2): 66-68.
|
[11] |
XIANG Tingting1,LUO Yunlun2,WANG Xuesong1.
Application of manifold learning and nonlinear dimensionality reduction in private preserving
[J]. Computer Engineering and Applications, 2011, 47(8): 79-82.
|
[12] |
CHEN Qingyu,LIU Jianwei,LIU Jing.
Semi-decentralization based access control mechanism for social networks
[J]. Computer Engineering and Applications, 2011, 47(20): 85-87.
|
[13] |
SHEN Zhong-lin,CUI Jian-guo.
Improved algorithm of association rule mining in privacy preserving
[J]. Computer Engineering and Applications, 2010, 46(8): 133-136.
|
[14] |
ZHANG Guo-rong1,YIN Jian2.
Privacy preserving using fuzzy sets
[J]. Computer Engineering and Applications, 2010, 46(28): 118-121.
|
[15] |
ZHANG Rui,ZHENG Cheng,CHEN Juan-juan.
Simple method on privacy preserving in association rules mining
[J]. Computer Engineering and Applications, 2008, 44(28): 130-132.
|