[1] |
DING Xiaohui, CAO Suzhen, WANG Caifen.
Smart Contract-Assisted Dynamically Searchable Encryption Scheme with Forward and Backward Security
[J]. Computer Engineering, 2022, 48(7): 141-150.
|
[2] |
JIN Haibo, ZHAO Xinyue.
High-Reliability Intrusion Detection Algorithm Under Conformal Prediction Framework
[J]. Computer Engineering, 2022, 48(7): 130-140.
|
[3] |
ZHANG Chao, PENG Changgen, DING Hongfa, XU Dequan.
Searchable Encryption Scheme Based on China State Cryptography Standard SM9
[J]. Computer Engineering, 2022, 48(7): 159-167.
|
[4] |
YE Qing, ZHAO Nannan, ZHAO Zongqu, QIN Panke, YAN Xixi, TANG Yongli.
Efficient Fully Dynamic Group Signature Scheme from Lattice
[J]. Computer Engineering, 2021, 47(2): 160-167,175.
|
[5] |
JI Lusheng, ZHANG Guiling, YANG Jiarun.
Off-Chain Personal Data Protection Scheme Based on Blockchain
[J]. Computer Engineering, 2021, 47(2): 176-181,187.
|
[6] |
ZHANG Jing, HE Zheng, GE Binghui, TANG Yongli, YE Qing.
An Efficient Protocol for Millionaires' Problem and Its Application
[J]. Computer Engineering, 2021, 47(2): 168-175.
|
[7] |
YOU Wenzhu, GE Haibo.
Efficient Algorithm for Multi-Scalar Multiplication of Elliptic Curves Using Multi-Base Number System
[J]. Computer Engineering, 2021, 47(2): 182-187.
|
[8] |
FU Zixi, XU Yang, WU Zhaodi, XU Dandan, XIE Xiaoyao.
SVM-KNN Network Intrusion Detection Method Based on Incremental Learning
[J]. Computer Engineering, 2020, 46(4): 115-122.
|
[9] |
LIU Xueyan, HE Xiaomei, LU Tingting, LUO Yukun.
Certificateless Public Audit Scheme for Shared Data
[J]. Computer Engineering, 2020, 46(4): 143-150.
|
[10] |
ZENG Yaqin, ZHANG Linlin, ZHANG Ruonan, YANG Bo.
Malware Family Classification Model Based on MobileNet
[J]. Computer Engineering, 2020, 46(4): 162-168.
|
[11] |
ZHANG Rui, CHEN Hongwei.
Intrusion Detection Based on Feature Optimization and SVPSO for Industrial Control System
[J]. Computer Engineering, 2020, 46(4): 19-25.
|
[12] |
LI Zhi, SONG Lipeng.
Research on Internal Threat Detection Based on User Window Behavior
[J]. Computer Engineering, 2020, 46(4): 135-142,150.
|
[13] |
SHI Zhicai, WANG Yihan, ZHANG Xiaomei, CHEN Jiwei, CHEN Shanshan.
An RFID Grouping-proof Protocol with Privacy Protection and Forward Security
[J]. Computer Engineering, 2020, 46(1): 108-113.
|
[14] |
ZHAO Nan, ZHANG Guoan, GU Xiaohui.
Certificateless Aggregate Signature Scheme for Privacy Protection in VANET
[J]. Computer Engineering, 2020, 46(1): 114-120,128.
|
[15] |
LI Yuanhang, CHEN Xianlai, LIU Li, AN Ying, LI Zhongmin.
Random Forest Algorithm for Differential Privacy Protection
[J]. Computer Engineering, 2020, 46(1): 93-101.
|