[1] |
XU Chao, RUAN Rongyao, CHEN Yong, .
A blockchain-based medical data auditing method
[J]. Computer Engineering & Science, 2025, 47(01): 95-106.
|
[2] |
YANG Xu-dong, LI Qiu-yan, GAO Ling, LIU Xin, DENG Ya-ni.
A distributed location anonymization method based on multi-blockchain collaboration
[J]. Computer Engineering & Science, 2024, 46(12): 2171-2185.
|
[3] |
YANG Song, WANG Xin-ru, LI Fan, ZHU Lie-huang, ZHAO Bo.
A blockchain-based crowdsourcing incentive mechanism
[J]. Computer Engineering & Science, 2024, 46(11): 1960-1970.
|
[4] |
ZHAO Wen-tao, GUAN Li-he, HE Jian-guo, TANG Hao.
A privacy protection recommendation algorithm in block chain environment
[J]. Computer Engineering & Science, 2024, 46(06): 1032-1040.
|
[5] |
ZHANG Feng, WEN Bin, YAN Yi-fei, ZENG Zhao-wu, ZHOU Wei, .
An identity-encryption multi-cloud multi-copy integrity auditing protocol
[J]. Computer Engineering & Science, 2024, 46(03): 453-462.
|
[6] |
SHEN Chuan-nian.
Review on security issues of blockchains
[J]. Computer Engineering & Science, 2024, 46(01): 46-62.
|
[7] |
YE Xi, ZHANG Yu-shu, ZHAO Ruo-yu, XIAO Xiang-li, WEN Wen-ying.
Usability-enhanced thumbnail-preserving encryption
[J]. Computer Engineering & Science, 2023, 45(09): 1563-1571.
|
[8] |
FU Wei, XIE Zhen-jie, ZHU Ting-ting, REN Zheng-wei.
An assured deletion scheme of cloud data based on strongly non-separable cipher
[J]. Computer Engineering & Science, 2023, 45(03): 434-442.
|
[9] |
DUAN Ya-hong, WANG Zheng, ZHAO Juan-juan, WANG Long.
A verifiable attribute encryption scheme supporting decryption outsourcing in fog computing
[J]. Computer Engineering & Science, 2023, 45(03): 443-452.
|
[10] |
LIN Qing, TENG Fei, TIAN Bo, ZHAO Yue, ZHU Jin-ye, FENG Li.
An encrypted knowledge graph storage and retrieval scheme based on searchable encryption
[J]. Computer Engineering & Science, 2023, 45(01): 66-76.
|
[11] |
CHEN Qiang, TAN Lin, WANG Yun-li, XIAO Jing.
A CUDA-based data-parallel processing method in industrial blockchain
[J]. Computer Engineering & Science, 2022, 44(12): 2102-2110.
|
[12] |
NIU Shu-fen, ZHANG Mei-ling, ZHOU Si-wei, YAN Sen.
A ciphertext verifiable attribute-based searchable encryption scheme for mobile terminals
[J]. Computer Engineering & Science, 2022, 44(11): 1941-1950.
|
[13] |
DING Yan, WANG Chuang, FENG Liao-liao, WANG Feng, CHANG Jun-sheng.
Trusted data circulation between alliances based on supervision of blockchain
[J]. Computer Engineering & Science, 2022, 44(10): 1771-1780.
|
[14] |
NIU Shu-fen, YU Fei, CHEN Li-xia, WANG Cai-fen.
A data sharing scheme for encrypted electronic health record
[J]. Computer Engineering & Science, 2022, 44(09): 1610-1619.
|
[15] |
ZHENG Si-fei, FENG Zi-jing, LIU Cheng-yu, CHEN Ri-qing, LIU Xiao-long.
An image camouflage encryption method based on vector quantization in cloud storage environment
[J]. Computer Engineering & Science, 2022, 44(06): 1030-1036.
|