[1] |
WEI Lifei, LI Mengsi, ZHANG Lei, CHEN Congcong, CHEN Yujiao, WANG Qin.
Privacy-Preserving Linear Regression Algorithm Based on Secure Two-Party Computation
[J]. Computer Engineering and Applications, 2021, 57(22): 139-146.
|
[2] |
HE Zhiming, XU Yida.
Electronic Medical Record Sharing Scheme Based on Blockchain and Searchable Encryption
[J]. Computer Engineering and Applications, 2021, 57(21): 140-147.
|
[3] |
LYU Xin, ZHAO Liancheng, YU Jiyuan, TAN Bin, ZENG Tao, CHEN Juan.
Trajectory-Clustering Based Privacy Protection Method for Continuous Query in LBS
[J]. Computer Engineering and Applications, 2021, 57(2): 104-112.
|
[4] |
XIE Yuqing, WANG Yuan, JIANG Ying, YANG Miao, WANG Yongli.
Privacy Protection Method Facilitating Data Sharing for Grid Manufacturing Data Lake
[J]. Computer Engineering and Applications, 2021, 57(2): 113-118.
|
[5] |
SONG Guochao, CHU Guanghui, WU Shaoxin.
Location Privacy Protection Approach Based on Interval Region
[J]. Computer Engineering and Applications, 2020, 56(8): 66-73.
|
[6] |
ZENG Haiyan, ZUO Kaizhong, WANG Yonglu, LIU Rui.
Semantic Diversity Location Privacy Protection Method in Road Network Environment
[J]. Computer Engineering and Applications, 2020, 56(7): 102-108.
|
[7] |
XU Bin, LIANG Xiaobing, SHEN Bo.
Non-interactive Queries Differential Privacy Protection Model in Big Data Environment
[J]. Computer Engineering and Applications, 2020, 56(7): 116-121.
|
[8] |
ZHANG Siliang, LING Jie, CHEN Jiahui.
Traceable Blockchain Ledger Privacy Protection Scheme
[J]. Computer Engineering and Applications, 2020, 56(23): 31-37.
|
[9] |
YANG Ting, PANG Xiaoqiong, CHEN Wenjun, WANG Yunting, LIU Tianye.
Digital Rights Management Supporting Privacy Protection in Blockchain Environment
[J]. Computer Engineering and Applications, 2020, 56(23): 109-115.
|
[10] |
WANG Jiahe, WEI Songjie, WU Chao.
Android Apps Traffic Behavior Obfuscation Method Based on Differential Privacy Protection
[J]. Computer Engineering and Applications, 2020, 56(2): 68-75.
|
[11] |
PIAO Yangheran, CUI Xiaohui.
Review on User Privacy Inference and Protection in Social Networks
[J]. Computer Engineering and Applications, 2020, 56(19): 1-12.
|
[12] |
MA Yuanyuan, LIU Zhoubin, WANG Zixiang.
Research on Heterogeneous Terminal Security Access Technology in Edge Computing Scenario
[J]. Computer Engineering and Applications, 2020, 56(17): 115-120.
|
[13] |
WANG Yonglu, ZUO Kaizhong, ZENG Haiyan, LIU Rui, GUO Liangmin.
Sensitive-Semantic Location Privacy Protection for Continuous Query
[J]. Computer Engineering and Applications, 2020, 56(14): 74-81.
|
[14] |
WANG Zhanjun, MA Haiying, WANG Jinhua, Li Yan.
Efficiently Revocable Identity-Based Online/Offline Encryption Scheme
[J]. Computer Engineering and Applications, 2020, 56(13): 114-119.
|
[15] |
KE Changbo, WU Jiayu, CAO Yan.
Research on Oriented Application Layer Evolution Privacy Protection Method in Cloud Computing
[J]. Computer Engineering and Applications, 2020, 56(11): 60-66.
|