[1] |
ZHANG Liang, LIU Baixiang.
Survey on Integrated Technology of Blockchain and Secret Sharing
[J]. Computer Engineering, 2022, 48(8): 1-11.
|
[2] |
CHEN Ruyu, DAI Huan, GAO Yujian, FU Baochuan, CHEN Jie.
Electronic Degree Certificate Data Protection and Sharing Method Based on Blockchain
[J]. Computer Engineering, 2022, 48(4): 50-60,80.
|
[3] |
ZHOU Neng, ZHANG Minqing, LIN Wenbing.
Separable Reversible Information Hiding Algorithm in Encrypted Domain Based on Secret Sharing
[J]. Computer Engineering, 2020, 46(10): 112-119.
|
[4] |
XU Shuo, TANG Zuoqi, WANG Xin.
Information Security Risk Assessment Based on D-AHP and Grey Theory
[J]. Computer Engineering, 2019, 45(7): 194-202.
|
[5] |
TAN Yuesheng,LU Liming,WANG Jingyu.
Ciphertext Policy Encryption Scheme Based on Secure Three-party Computation
[J]. Computer Engineering, 2019, 45(1): 115-120,128.
|
[6] |
DU Yuanzhi,DU Xuehui,YANG Zhi.
Attribute-based Encryption Information Flow Control and Implementation in Cloud Computing Environment
[J]. Computer Engineering, 2018, 44(3): 27-36.
|
[7] |
HUANG Yujie,TANG Zuoqi,LIANG Jing.
Information Security Risk Assessment Based on Information Entropy and Three-parameter Interval
[J]. Computer Engineering, 2018, 44(12): 178-183.
|
[8] |
JIAN Chunfu,XIE Jihua,JIN Junhua.
Research and Application of Cloud Digital Signature Technology
[J]. Computer Engineering, 2017, 43(12): 1-5.
|
[9] |
CHEN Yu,WANG Yadi,WANG Jindong,WANG Na.
Application Research on Fuzzy Cognitive Map in Information Security Risk Assessment
[J]. Computer Engineering, 2016, 42(7): 109-116.
|
[10] |
ZHANG Guolin,GUAN Juhua,ZHANG Shuye.
Image Steganography Technology Based on Karhunen-Loeve Transform Optimization
[J]. Computer Engineering, 2016, 42(2): 151-156.
|
[11] |
HUANG Kai,JIN Xiaofei,XIU Siwen,TANG Congxue,YAN Xiaolang.
Design of Efficient Reconfigurable Hardware Architecture of Symmetric Key Algorithms
[J]. Computer Engineering, 2015, 41(9): 85-91.
|
[12] |
GUO Hui,BAI Sen,YANG Yi,SONG Bin LI Shuyun.
Recursive Upgrade Construction Method of M Sequence Based on de Bruijn Graph
[J]. Computer Engineering, 2015, 41(8): 144-149,161.
|
[13] |
YANG Cheng,WANG Yun-kai,HONG Rui-long.
Behavior Research of Internet User Passwords Based on Pinyin Analysis
[J]. Computer Engineering, 2014, 40(9): 174-177,182.
|
[14] |
XU Chan,LIU Xin,WU Jian,OUYANG Bo-yu.
Software Behavior Evaluation System Based on BP Neural Network
[J]. Computer Engineering, 2014, 40(9): 149-154.
|
[15] |
PENG You, SONG Yan, JU Hang, WANG Yan-zhang.
Study of Cross-domain Access Control Among Emergency Organizations Based on Position-mapping
[J]. Computer Engineering, 2014, 40(6): 104-108,114.
|