| [1] |
WEI Kexin1, LI Leixiao1, 2, SI Qin1, 2, SHI Jianping3.
A hybrid access control model based on smart contract for the Internet of Vehicle environment
[J]. Computer Engineering & Science, 2025, 47(6): 1028-1040.
|
| [2] |
ZHANG Feng, WEN Bin, YAN Yi-fei, ZENG Zhao-wu, ZHOU Wei, .
An identity-encryption multi-cloud multi-copy integrity auditing protocol
[J]. Computer Engineering & Science, 2024, 46(3): 453-462.
|
| [3] |
LI Yu-xin, WANG Zheng, WANG Hui, SUN Jian-wei.
A revocable traceable access control scheme in autonomous vehicle platoon
[J]. Computer Engineering & Science, 2024, 46(2): 232-243.
|
| [4] |
ZHAO Wen-hui, WU Xiao-ling, LING Jie, HOON Heo.
Multi-domain sentiment analysis of Chinese text based on prompt tuning
[J]. Computer Engineering & Science, 2024, 46(1): 179-190.
|
| [5] |
YE Xi, ZHANG Yu-shu, ZHAO Ruo-yu, XIAO Xiang-li, WEN Wen-ying.
Usability-enhanced thumbnail-preserving encryption
[J]. Computer Engineering & Science, 2023, 45(9): 1563-1571.
|
| [6] |
FU Wei, XIE Zhen-jie, ZHU Ting-ting, REN Zheng-wei.
An assured deletion scheme of cloud data based on strongly non-separable cipher
[J]. Computer Engineering & Science, 2023, 45(3): 434-442.
|
| [7] |
DUAN Ya-hong, WANG Zheng, ZHAO Juan-juan, WANG Long.
A verifiable attribute encryption scheme supporting decryption outsourcing in fog computing
[J]. Computer Engineering & Science, 2023, 45(3): 443-452.
|
| [8] |
XU Cheng-zhou, WANG Chen, ZHANG Wen-tao.
A time factor based revocable and traceable attribute-based encryption scheme
[J]. Computer Engineering & Science, 2023, 45(2): 286-294.
|
| [9] |
DING Yan, WANG Peng, WANG Chuang, LI Zhi-peng, SONG Lian-tao, FENG Liao-liao.
An attribute-based dynamic mandatory access control mechanism for operating system
[J]. Computer Engineering & Science, 2023, 45(10): 1770-1778.
|
| [10] |
XU Cheng-zhou, LI Lu, ZHANG Wen-tao.
An attribute-based encryption scheme supporting complex access policies
[J]. Computer Engineering & Science, 2023, 45(10): 1779-1788.
|
| [11] |
MA Jia-jia, CAO Su-zhen, DOU Feng-ge, DING Xiao-hui, DING Bin-bin, WANG Cai-fen, .
An encryption and decryption outsourcing solution supporting attribute updates in a smart medical environment
[J]. Computer Engineering & Science, 2022, 44(9): 1594-1601.
|
| [12] |
NIU Shu-fen, YU Fei, CHEN Li-xia, WANG Cai-fen.
A data sharing scheme for encrypted electronic health record
[J]. Computer Engineering & Science, 2022, 44(9): 1610-1619.
|
| [13] |
CUI Chen-yu, ZHANG Li-na, .
A threshold multi-secret sharing scheme with identity lock
[J]. Computer Engineering & Science, 2022, 44(8): 1382-1391.
|
| [14] |
ZHENG Si-fei, FENG Zi-jing, LIU Cheng-yu, CHEN Ri-qing, LIU Xiao-long.
An image camouflage encryption method based on vector quantization in cloud storage environment
[J]. Computer Engineering & Science, 2022, 44(6): 1030-1036.
|
| [15] |
XU Cheng-zhou, ZHANG Wen-tao, LANG Jing-hong.
An attribute-based encryption scheme preventing irrelevant attributes interference
[J]. Computer Engineering & Science, 2022, 44(5): 800-809.
|