[1] |
ZHANG Feng, WEN Bin, YAN Yi-fei, ZENG Zhao-wu, ZHOU Wei, .
An identity-encryption multi-cloud multi-copy integrity auditing protocol
[J]. Computer Engineering & Science, 2024, 46(03): 453-462.
|
[2] |
YE Xi, ZHANG Yu-shu, ZHAO Ruo-yu, XIAO Xiang-li, WEN Wen-ying.
Usability-enhanced thumbnail-preserving encryption
[J]. Computer Engineering & Science, 2023, 45(09): 1563-1571.
|
[3] |
FU Wei, XIE Zhen-jie, ZHU Ting-ting, REN Zheng-wei.
An assured deletion scheme of cloud data based on strongly non-separable cipher
[J]. Computer Engineering & Science, 2023, 45(03): 434-442.
|
[4] |
ZHENG Si-fei, FENG Zi-jing, LIU Cheng-yu, CHEN Ri-qing, LIU Xiao-long.
An image camouflage encryption method based on vector quantization in cloud storage environment
[J]. Computer Engineering & Science, 2022, 44(06): 1030-1036.
|
[5] |
NIU Shufen, WANG Jinfeng, WANG Bobin, CHEN Jingmin, DU Xiaoni.
A searchable encryption scheme supporting multi-keyword retrieval on blockchain
[J]. Computer Engineering & Science, 2020, 42(11): 2005-2012.
|
[6] |
WEN Kai1,2,3,TAN Xiao1,2.
A cache replicas placement scheme in D2D networks
[J]. Computer Engineering & Science, 2019, 41(08): 1421-1425.
|
[7] |
XIE Guojun,SHEN Jiquan,YANG Huanhuan.
An HDFS storage optimization strategy based on Cauchy code
[J]. Computer Engineering & Science, 2019, 41(03): 440-445.
|
[8] |
QIAN Zheng1,2,XIA Hongxia2.
Remote audit of big data cloud storage based on
finite field algebraic signature partition table
[J]. Computer Engineering & Science, 2018, 40(11): 1907-1914.
|
[9] |
FU Wei1,LI Moci2,ZHAO Huarong2,WU Yong2.
CRSHE: A novel ciphertext retrieval scheme
based on homomorphic encryption
[J]. Computer Engineering & Science, 2018, 40(09): 1540-1545.
|
[10] |
YANG Xiaodong,YANG Miaomiao,LIU Tingting,WANG Caifen.
A multi-domain access control scheme based on
multi-authority attribute encryption for cloud storage
[J]. Computer Engineering & Science, 2018, 40(07): 1192-1198.
|
[11] |
JIANG Xiao-ping,ZHANG Wei,LI Cheng-hua,ZHOU Hang,SUN Jing.
A document similarity calculation method based on fully
homomorphic encryption technology for cloud storage
[J]. Computer Engineering & Science, 2017, 39(10): 1807-1811.
|
[12] |
HUANG Dong-mei1,XU Hui-fang1,HE Qi1,DU Yan-ling1,WEI Quan-miao2.
A secret sharing-based authentication scheme for
ocean remote sensing images in cloud environment
[J]. Computer Engineering & Science, 2017, 39(08): 1410-1418.
|
[13] |
ZHANG Zhi-xin1,WANG Chun-dong2,JIANG Shu-hao1.
Integrity check of cloud storage threat model based
on pseudo random bilinear mapping
[J]. Computer Engineering & Science, 2017, 39(06): 1048-1055.
|
[14] |
REN Jingsi1,2,WANG Jinlin1,CHEN Xiao1,YE Xiaozhou1.
A method for ensuring data confidentiality in cloud storage
[J]. Computer Engineering & Science, 2016, 38(12): 2402-2408.
|
[15] |
ZHOU Lanfeng1,MENG Chi1,PENG Junjie2.
A file storage scheme based on
cloud environment
[J]. J4, 2016, 38(02): 262-268.
|