[1] |
WENG Xiaoyong.
Research on Blockchain Based Cloud Computing Data Sharing System
[J]. Computer Engineering and Applications, 2021, 57(3): 120-124.
|
[2] |
WEI Lifei, LI Mengsi, ZHANG Lei, CHEN Congcong, CHEN Yujiao, WANG Qin.
Privacy-Preserving Linear Regression Algorithm Based on Secure Two-Party Computation
[J]. Computer Engineering and Applications, 2021, 57(22): 139-146.
|
[3] |
TONG Le, HAO Rong, YU Jia.
Secure Outsourcing Scheme for Bilinear Pairing Based on Single Untrusted Server
[J]. Computer Engineering and Applications, 2020, 56(9): 131-135.
|
[4] |
WANG Yunmin, LI Hui, WANG Han, BAI Yongjie, NING Chonghui.
Research on Identifier Data Management Strategy of Industrial Internet Based on Blockchain
[J]. Computer Engineering and Applications, 2020, 56(7): 1-7.
|
[5] |
PENG Weiping, GUO Kaidi, SONG Cheng, YAN Xixi.
Traceable Leak Prevention Access Control Scheme for Outsourced Data
[J]. Computer Engineering and Applications, 2020, 56(6): 117-125.
|
[6] |
HUANG Dongmei, ZHANG Xuejian, WEI Lifei, LI Mengsi, SU Cheng.
Secure Outsourced Denoising Scheme in Remote Sensing Images on Multi-cloud Architecture
[J]. Computer Engineering and Applications, 2020, 56(22): 92-99.
|
[7] |
YANG Haoyun, WANG Junfeng, LIU Jiayong, TANG Zhangguo.
Research and Implementation of Covert Channel of SSL Protocol
[J]. Computer Engineering and Applications, 2020, 56(20): 67-72.
|
[8] |
SHI Yuqing, LING Jie.
Traceable Attribute-Based Encryption with Hidden Access Policies
[J]. Computer Engineering and Applications, 2020, 56(16): 75-83.
|
[9] |
LIU Xiaochen, GAO Yuanyuan, XI Heping, ZHOU Mi.
Secure Energy Efficiency Optimization for RF-Powered Wireless Sensor Networks
[J]. Computer Engineering and Applications, 2019, 55(21): 122-128.
|
[10] |
SUN Ling1, LUO Changyuan2.
Secure Geographic Information Based Routing Protocol of Aeronautical Ad Hoc Networks
[J]. Computer Engineering and Applications, 2019, 55(12): 77-82.
|
[11] |
LV Congdong.
Relation between IP-secure and TA-secure in intransitive non-interference
[J]. Computer Engineering and Applications, 2018, 54(8): 78-84.
|
[12] |
ZHANG Yupeng1, WEN Mi2.
Design of dual authentication algorithm for Modbus protocol
[J]. Computer Engineering and Applications, 2018, 54(20): 93-98.
|
[13] |
LI Yanan, ZHANG Xuefeng.
Cancelable palmprint template method based on secure sketch
[J]. Computer Engineering and Applications, 2018, 54(18): 115-120.
|
[14] |
GAO Jin1, BAI Liang2.
Design of secure keys based on Web browser and online service
[J]. Computer Engineering and Applications, 2018, 54(17): 71-76.
|
[15] |
CAO Lifeng1, LI Haihua2, DU Xuehui1, CHEN Xingyuan1.
Research on binding of secure label based on unified description of information object
[J]. Computer Engineering and Applications, 2017, 53(9): 103-110.
|