[1] |
DING Yan, WANG Peng, WANG Chuang, LI Zhi-peng, SONG Lian-tao, FENG Liao-liao.
An attribute-based dynamic mandatory access control mechanism for operating system
[J]. Computer Engineering & Science, 2023, 45(10): 1770-1778.
|
[2] |
XU Cheng-zhou, LI Lu, ZHANG Wen-tao.
An attribute-based encryption scheme supporting complex access policies
[J]. Computer Engineering & Science, 2023, 45(10): 1779-1788.
|
[3] |
DUAN Ya-hong, WANG Zheng, ZHAO Juan-juan, WANG Long.
A verifiable attribute encryption scheme supporting decryption outsourcing in fog computing
[J]. Computer Engineering & Science, 2023, 45(03): 443-452.
|
[4] |
XU Cheng-zhou, WANG Chen, ZHANG Wen-tao.
A time factor based revocable and traceable attribute-based encryption scheme
[J]. Computer Engineering & Science, 2023, 45(02): 286-294.
|
[5] |
NIU Shu-fen, ZHANG Mei-ling, ZHOU Si-wei, YAN Sen.
A ciphertext verifiable attribute-based searchable encryption scheme for mobile terminals
[J]. Computer Engineering & Science, 2022, 44(11): 1941-1950.
|
[6] |
TANG Guang-zhen, CHEN Zhuo.
A traceable hierarchical attribute-based encryption scheme with hidden access policy
[J]. Computer Engineering & Science, 2022, 44(10): 1788-1794.
|
[7] |
NIU Shu-fen, YU Fei, CHEN Li-xia, WANG Cai-fen.
A data sharing scheme for encrypted electronic health record
[J]. Computer Engineering & Science, 2022, 44(09): 1610-1619.
|
[8] |
CUI Chen-yu, ZHANG Li-na, .
A threshold multi-secret sharing scheme with identity lock
[J]. Computer Engineering & Science, 2022, 44(08): 1382-1391.
|
[9] |
XU Cheng-zhou, ZHANG Wen-tao, LANG Jing-hong.
An attribute-based encryption scheme preventing irrelevant attributes interference
[J]. Computer Engineering & Science, 2022, 44(05): 800-809.
|
[10] |
WANG Xin, LIU Xiao-yan, ZHANG Kai-qi, WANG Xing, YAN Xin.
Design and implementation of a change event driven microservice composition platform
[J]. Computer Engineering & Science, 2021, 43(10): 1781-1788.
|
[11] |
CHEN Si-qi, HUANG Ru-wei.
Attribute-based encryption supporting conjunctive keyword
[J]. Computer Engineering & Science, 2021, 43(07): 1219-1225.
|
[12] |
ZE Kai1,CHEN Dan1,2,ZHUANG Yi1.
A multilevel dynamic trusted measurement
model based on information flow
[J]. Computer Engineering & Science, 2018, 40(12): 2156-2163.
|
[13] |
YANG Xiaodong,YANG Miaomiao,LIU Tingting,WANG Caifen.
A multi-domain access control scheme based on
multi-authority attribute encryption for cloud storage
[J]. Computer Engineering & Science, 2018, 40(07): 1192-1198.
|
[14] |
WEI Lifeng,DING Yan,CHEN Songzheng,HUANG Chenlin.
A method for protecting user data
files based on private directory container
[J]. J4, 2016, 38(03): 460-464.
|
[15] |
ZHAO Bin1,2,HE Jingsha1, ZHANG Yixuan1,JI Xinrong1.
A risk minimization authorization model
based on knowledge discovery
[J]. J4, 2015, 37(11): 2112-2120.
|