[1] |
YANG Xiaodong, LI Muzi, MA Guozu, LI Songyu, WANG Caifen.
Certificateless Anonymous Authentication Scheme Supporting Illegal Signatures Localization for Internet of Vehicles
[J]. Computer Engineering, 2024, 50(6): 157-165.
|
[2] |
XIONG Shiqiang, HE Daojing, WANG Zhendong, DU Runmeng.
Review of Federated Learning and Its Security and Privacy Protection
[J]. Computer Engineering, 2024, 50(5): 1-15.
|
[3] |
WANG Dong, WANG Hejian, XUAN Jiaxing, ZHENG Shangzhuo, CHEN Bingcong.
Blockchain Privacy-Traceable Deposit Scheme for Power-Dispatch Instructions
[J]. Computer Engineering, 2024, 50(5): 158-166.
|
[4] |
WANG Yiliang, ZHOU Peng, YE Wei, QI Weiqiang.
Non-Intrusive Load Monitoring and Its Privacy-Preserving Scheme Based on Pyramid Network
[J]. Computer Engineering, 2024, 50(5): 182-189.
|
[5] |
JIN Haibo, ZHAO Xinyue.
High-Reliability Intrusion Detection Algorithm Under Conformal Prediction Framework
[J]. Computer Engineering, 2022, 48(7): 130-140.
|
[6] |
DING Xiaohui, CAO Suzhen, WANG Caifen.
Smart Contract-Assisted Dynamically Searchable Encryption Scheme with Forward and Backward Security
[J]. Computer Engineering, 2022, 48(7): 141-150.
|
[7] |
ZHANG Chao, PENG Changgen, DING Hongfa, XU Dequan.
Searchable Encryption Scheme Based on China State Cryptography Standard SM9
[J]. Computer Engineering, 2022, 48(7): 159-167.
|
[8] |
YE Qing, ZHAO Nannan, ZHAO Zongqu, QIN Panke, YAN Xixi, TANG Yongli.
Efficient Fully Dynamic Group Signature Scheme from Lattice
[J]. Computer Engineering, 2021, 47(2): 160-167,175.
|
[9] |
ZHANG Jing, HE Zheng, GE Binghui, TANG Yongli, YE Qing.
An Efficient Protocol for Millionaires' Problem and Its Application
[J]. Computer Engineering, 2021, 47(2): 168-175.
|
[10] |
JI Lusheng, ZHANG Guiling, YANG Jiarun.
Off-Chain Personal Data Protection Scheme Based on Blockchain
[J]. Computer Engineering, 2021, 47(2): 176-181,187.
|
[11] |
YOU Wenzhu, GE Haibo.
Efficient Algorithm for Multi-Scalar Multiplication of Elliptic Curves Using Multi-Base Number System
[J]. Computer Engineering, 2021, 47(2): 182-187.
|
[12] |
ZHANG Rui, CHEN Hongwei.
Intrusion Detection Based on Feature Optimization and SVPSO for Industrial Control System
[J]. Computer Engineering, 2020, 46(4): 19-25.
|
[13] |
FU Zixi, XU Yang, WU Zhaodi, XU Dandan, XIE Xiaoyao.
SVM-KNN Network Intrusion Detection Method Based on Incremental Learning
[J]. Computer Engineering, 2020, 46(4): 115-122.
|
[14] |
LI Zhi, SONG Lipeng.
Research on Internal Threat Detection Based on User Window Behavior
[J]. Computer Engineering, 2020, 46(4): 135-142,150.
|
[15] |
LIU Xueyan, HE Xiaomei, LU Tingting, LUO Yukun.
Certificateless Public Audit Scheme for Shared Data
[J]. Computer Engineering, 2020, 46(4): 143-150.
|