| [1] |
SHEN Jinshang, ZHANG Qingshun, SONG Tierui.
Implementation of high-speed AES based on FPGA and improvement of MixColumn
[J]. Computer Engineering & Science, 2025, 47(04): 612-620.
|
| [2] |
ZHANG Xiaojun, ZHANG Hao, LI Xingpeng, ZHANG Jingwei.
Research and application of multi-dimensional encrypted data aggregation technology for smart oil and gas exploration and development system
[J]. Computer Engineering & Science, 2025, 47(04): 634-643.
|
| [3] |
YAN Shaohui, JIANG Jiawei, CUI Yu.
Image encryption and FPGA implementation based on 3D chaotic system
[J]. Computer Engineering & Science, 2025, 47(04): 686-694.
|
| [4] |
HUANG Ying, TANG Min, .
Privacy-preserving gene testing based on deep neural network
[J]. Computer Engineering & Science, 2025, 47(02): 265-275.
|
| [5] |
GAO Yingying, TIAN Ye.
An image encryption algorithm based on fractional 2D-TFCDM mapping and improved Hilbert curve scrambling
[J]. Computer Engineering & Science, 2025, 47(01): 66-74.
|
| [6] |
LI Ming, XIN Xin.
Information hiding algorithm in compressive sensing encrypted domain based on homomorphism addition
[J]. Computer Engineering & Science, 2024, 46(09): 1598-1605.
|
| [7] |
ZHAO Wen-tao, GUAN Li-he, HE Jian-guo, TANG Hao.
A privacy protection recommendation algorithm in block chain environment
[J]. Computer Engineering & Science, 2024, 46(06): 1032-1040.
|
| [8] |
NIU Shi-ming, XUE Ru, DING Cong.
A color image encryption method based on improved 3D_Henon chaos mapping
[J]. Computer Engineering & Science, 2024, 46(04): 657-666.
|
| [9] |
ZHANG Feng, WEN Bin, YAN Yi-fei, ZENG Zhao-wu, ZHOU Wei, .
An identity-encryption multi-cloud multi-copy integrity auditing protocol
[J]. Computer Engineering & Science, 2024, 46(03): 453-462.
|
| [10] |
LI Yu-xin, WANG Zheng, WANG Hui, SUN Jian-wei.
A revocable traceable access control scheme in autonomous vehicle platoon
[J]. Computer Engineering & Science, 2024, 46(02): 232-243.
|
| [11] |
WANG Ji-chang, L Gao-feng, LIU Zhong-pei, YANG Xiang-rui.
QUIC encryption and decryption offloading based on data processing unit
[J]. Computer Engineering & Science, 2023, 45(11): 1960-1969.
|
| [12] |
XU Cheng-zhou, LI Lu, ZHANG Wen-tao.
An attribute-based encryption scheme supporting complex access policies
[J]. Computer Engineering & Science, 2023, 45(10): 1779-1788.
|
| [13] |
YE Xi, ZHANG Yu-shu, ZHAO Ruo-yu, XIAO Xiang-li, WEN Wen-ying.
Usability-enhanced thumbnail-preserving encryption
[J]. Computer Engineering & Science, 2023, 45(09): 1563-1571.
|
| [14] |
DUAN Ya-hong, WANG Zheng, ZHAO Juan-juan, WANG Long.
A verifiable attribute encryption scheme supporting decryption outsourcing in fog computing
[J]. Computer Engineering & Science, 2023, 45(03): 443-452.
|
| [15] |
LI Wen-qing, MA Rui, ZHANG Wen-tao.
An efficient multi-key homomorphic encryption scheme based on common key
[J]. Computer Engineering & Science, 2023, 45(02): 252-260.
|