[1] |
WEI Lifei, LI Mengsi, ZHANG Lei, CHEN Congcong, CHEN Yujiao, WANG Qin.
Privacy-Preserving Linear Regression Algorithm Based on Secure Two-Party Computation
[J]. Computer Engineering and Applications, 2021, 57(22): 139-146.
|
[2] |
SONG Xiuli, ZHOU Daoyang, CAO Yunfan.
Design and Simulation of [d]dimensional Quantum Homomorphic Encryption Algorithm
[J]. Computer Engineering and Applications, 2020, 56(7): 109-115.
|
[3] |
HAN Bang, LI Zichen, TANG Yongli.
Design and Implementation of Full Text Retrieval Scheme Based on Homomorphic Encryption
[J]. Computer Engineering and Applications, 2020, 56(21): 103-107.
|
[4] |
TAN Yuesheng, LU Liming, WANG Jingyu.
Ciphertext-Policy Attribute Encryption Scheme Based on Homomorphic Encryption
[J]. Computer Engineering and Applications, 2019, 55(19): 115-120.
|
[5] |
LIU Yudong, WANG Xu’an, GAO Zhongshi.
Euclidean Distance Outsourcing Computation Protocol Based on Homomorphic Encryption Algorithm
[J]. Computer Engineering and Applications, 2019, 55(15): 110-116.
|
[6] |
ZHANG Sijia1, GU Chunhua2, WEN Mi1.
Analysis and Research on Data Aggregation Scheme in Smart Grid
[J]. Computer Engineering and Applications, 2019, 55(12): 83-89.
|
[7] |
XIA Chao1, ZHONG Hong1,2, SHI Runhua1,2.
Secure multi-party multiplication protocol based on homomorphic encryption technology
[J]. Computer Engineering and Applications, 2015, 51(1): 76-80.
|
[8] |
SHI Baoming1, HE Yuanxiang1, WU Chongzheng2.
Research on search strategy of web spider in topic-oriented search engines
[J]. Computer Engineering and Applications, 2014, 50(2): 116-119.
|
[9] |
LU Hong1,LIAO Longlong2.
Privacy-preserving model of LBS in Internet of Things
[J]. Computer Engineering and Applications, 2014, 50(15): 91-96.
|
[10] |
ZHU Huahong, HE Qianhua, LI Yanxiong, PAN Weiqiang.
Homomorphic encryption scheme based voiceprint template design and analysis
[J]. Computer Engineering and Applications, 2014, 50(13): 15-20.
|
[11] |
MA Wenwen1, WEI Wenhan1, DEGN Yigui1,2.
Micro-blog topic detection method based on Latent Semantic Analysis
[J]. Computer Engineering and Applications, 2014, 50(1): 96-100.
|
[12] |
HE Kang1, LI Mengxing2, ZHAO Jian1, FENG Quan1.
Fingercode based remote fingerprint authentication scheme using homomorphic encryption
[J]. Computer Engineering and Applications, 2013, 49(24): 78-82.
|
[13] |
GU Chunsheng1,2, JING Zhengjun1,3, YU Zhimin1.
Breaking faster fully homomorphic encryption scheme over integer
[J]. Computer Engineering and Applications, 2013, 49(21): 101-105.
|
[14] |
TANG Dianhua, ZHU Shixiong, CAO Yunfei.
Faster fully homomorphic encryption scheme over integer
[J]. Computer Engineering and Applications, 2012, 48(28): 117-122.
|
[15] |
JIN Xiaofeng.
Intelligent information retrieval approach for large-scale collections of full-text document
[J]. Computer Engineering and Applications, 2011, 47(7): 143-145.
|