[1] |
ZHANG Feng, WEN Bin, YAN Yi-fei, ZENG Zhao-wu, ZHOU Wei, .
An identity-encryption multi-cloud multi-copy integrity auditing protocol
[J]. Computer Engineering & Science, 2024, 46(03): 453-462.
|
[2] |
WANG Fei-fei, BEN Ke-rong, ZHANG Xian.
Research on robust speech recognition technology based on domain knowledge
[J]. Computer Engineering & Science, 2023, 45(12): 2155-2164.
|
[3] |
YE Xi, ZHANG Yu-shu, ZHAO Ruo-yu, XIAO Xiang-li, WEN Wen-ying.
Usability-enhanced thumbnail-preserving encryption
[J]. Computer Engineering & Science, 2023, 45(09): 1563-1571.
|
[4] |
FU Wei, XIE Zhen-jie, ZHU Ting-ting, REN Zheng-wei.
An assured deletion scheme of cloud data based on strongly non-separable cipher
[J]. Computer Engineering & Science, 2023, 45(03): 434-442.
|
[5] |
TAN Hong-ye, XING Qin-jie.
Robustness enhancement oriented multi task machine reading comprehension
[J]. Computer Engineering & Science, 2023, 45(02): 363-369.
|
[6] |
ZHENG Si-fei, FENG Zi-jing, LIU Cheng-yu, CHEN Ri-qing, LIU Xiao-long.
An image camouflage encryption method based on vector quantization in cloud storage environment
[J]. Computer Engineering & Science, 2022, 44(06): 1030-1036.
|
[7] |
LI Wei-an, XIONG Xiang-guang, XIA Dao-xun.
A color image robust watermarking algorithm based on Schur decomposition and chaotic scrambling
[J]. Computer Engineering & Science, 2021, 43(07): 1243-1249.
|
[8] |
NIU Shufen, WANG Jinfeng, WANG Bobin, CHEN Jingmin, DU Xiaoni.
A searchable encryption scheme supporting multi-keyword retrieval on blockchain
[J]. Computer Engineering & Science, 2020, 42(11): 2005-2012.
|
[9] |
LI Wei-an,XIONG Xiang-guang,XIA Dao-xun.
A robust watermarking algorithm based
on hyper-chaotic and Slant transform
[J]. Computer Engineering & Science, 2020, 42(05): 812-818.
|
[10] |
QIAN Zheng1,2,XIA Hongxia2.
Remote audit of big data cloud storage based on
finite field algebraic signature partition table
[J]. Computer Engineering & Science, 2018, 40(11): 1907-1914.
|
[11] |
FU Wei1,LI Moci2,ZHAO Huarong2,WU Yong2.
CRSHE: A novel ciphertext retrieval scheme
based on homomorphic encryption
[J]. Computer Engineering & Science, 2018, 40(09): 1540-1545.
|
[12] |
YANG Xiaodong,YANG Miaomiao,LIU Tingting,WANG Caifen.
A multi-domain access control scheme based on
multi-authority attribute encryption for cloud storage
[J]. Computer Engineering & Science, 2018, 40(07): 1192-1198.
|
[13] |
JIANG Xiao-ping,ZHANG Wei,LI Cheng-hua,ZHOU Hang,SUN Jing.
A document similarity calculation method based on fully
homomorphic encryption technology for cloud storage
[J]. Computer Engineering & Science, 2017, 39(10): 1807-1811.
|
[14] |
WANG Yan,WANG Jin-kuan.
A dynamic replication placement
mechanism in cloud storage
[J]. Computer Engineering & Science, 2017, 39(09): 1581-1587.
|
[15] |
HUANG Dong-mei1,XU Hui-fang1,HE Qi1,DU Yan-ling1,WEI Quan-miao2.
A secret sharing-based authentication scheme for
ocean remote sensing images in cloud environment
[J]. Computer Engineering & Science, 2017, 39(08): 1410-1418.
|