[1] |
ZHAO Wen-tao, GUAN Li-he, HE Jian-guo, TANG Hao.
A privacy protection recommendation algorithm in block chain environment
[J]. Computer Engineering & Science, 2024, 46(06): 1032-1040.
|
[2] |
NIU Shi-ming, XUE Ru, DING Cong.
A color image encryption method based on improved 3D_Henon chaos mapping
[J]. Computer Engineering & Science, 2024, 46(04): 657-666.
|
[3] |
ZHANG Feng, WEN Bin, YAN Yi-fei, ZENG Zhao-wu, ZHOU Wei, .
An identity-encryption multi-cloud multi-copy integrity auditing protocol
[J]. Computer Engineering & Science, 2024, 46(03): 453-462.
|
[4] |
LI Yu-xin, WANG Zheng, WANG Hui, SUN Jian-wei.
A revocable traceable access control scheme in autonomous vehicle platoon
[J]. Computer Engineering & Science, 2024, 46(02): 232-243.
|
[5] |
WANG Ji-chang, L Gao-feng, LIU Zhong-pei, YANG Xiang-rui.
QUIC encryption and decryption offloading based on data processing unit
[J]. Computer Engineering & Science, 2023, 45(11): 1960-1969.
|
[6] |
XU Cheng-zhou, LI Lu, ZHANG Wen-tao.
An attribute-based encryption scheme supporting complex access policies
[J]. Computer Engineering & Science, 2023, 45(10): 1779-1788.
|
[7] |
YE Xi, ZHANG Yu-shu, ZHAO Ruo-yu, XIAO Xiang-li, WEN Wen-ying.
Usability-enhanced thumbnail-preserving encryption
[J]. Computer Engineering & Science, 2023, 45(09): 1563-1571.
|
[8] |
DUAN Ya-hong, WANG Zheng, ZHAO Juan-juan, WANG Long.
A verifiable attribute encryption scheme supporting decryption outsourcing in fog computing
[J]. Computer Engineering & Science, 2023, 45(03): 443-452.
|
[9] |
LI Wen-qing, MA Rui, ZHANG Wen-tao.
An efficient multi-key homomorphic encryption scheme based on common key
[J]. Computer Engineering & Science, 2023, 45(02): 252-260.
|
[10] |
XU Cheng-zhou, WANG Chen, ZHANG Wen-tao.
A time factor based revocable and traceable attribute-based encryption scheme
[J]. Computer Engineering & Science, 2023, 45(02): 286-294.
|
[11] |
LIN Qing, TENG Fei, TIAN Bo, ZHAO Yue, ZHU Jin-ye, FENG Li.
An encrypted knowledge graph storage and retrieval scheme based on searchable encryption
[J]. Computer Engineering & Science, 2023, 45(01): 66-76.
|
[12] |
HE Shui-yu, WEI Yue-chuan, PAN Feng, CHANG Li-peng.
Forgery attack on the authenticated encryption algorithm Pyjamask
[J]. Computer Engineering & Science, 2022, 44(12): 2140-2145.
|
[13] |
DING Bin-bin, CAO Su-zhen, DING Xiao-hui, DOU Feng-ge, MA Jia-jia.
Pairing-free identity-based public key encryption with equality test
[J]. Computer Engineering & Science, 2022, 44(12): 2146-2152.
|
[14] |
NIU Shu-fen, ZHANG Mei-ling, ZHOU Si-wei, YAN Sen.
A ciphertext verifiable attribute-based searchable encryption scheme for mobile terminals
[J]. Computer Engineering & Science, 2022, 44(11): 1941-1950.
|
[15] |
TANG Guang-zhen, CHEN Zhuo.
A traceable hierarchical attribute-based encryption scheme with hidden access policy
[J]. Computer Engineering & Science, 2022, 44(10): 1788-1794.
|