[1] |
Meng Xuying, Zhang Qijia, Zhang Hanwen, Zhang Yujun, Zhao Qinglin.
Personalized Privacy Preserving Link Prediction in Social Networks
[J]. Journal of Computer Research and Development, 2019, 56(6): 1244-1251.
|
[2] |
Zhao Zhiyuan, Wang Jianhua, Zhu Zhiqiang, Sun Lei.
Attribute-Based Encryption for Data Security Sharing of Internet of Things
[J]. Journal of Computer Research and Development, 2019, 56(6): 1290-1301.
|
[3] |
Qian Hanjia, Wang Yihuai, Peng Tao, Chen Cheng, Luo Xizhao.
Efficient and Verifiable Encryption Scheme in Lightweight Narrowband Internet of Things Applications
[J]. Journal of Computer Research and Development, 2019, 56(5): 1112-1122.
|
[4] |
Zhang Yuxuan, Wei Jianghong, Li Ji, Liu Wenfen, Hu Xuexian.
Graph Degree Histogram Publication Method with Node-Differential Privacy
[J]. Journal of Computer Research and Development, 2019, 56(3): 508-520.
|
[5] |
Meng Yan, Li Shaofeng, Zhang Yichi, Zhu Haojin, Zhang Xinpeng.
Cyber Physical System Security of Smart Home Platform
[J]. Journal of Computer Research and Development, 2019, 56(11): 2349-2364.
|
[6] |
Zhang Liancheng, Wang Yu, Kong Yazhou,Qiu Han.
Survey on Security Threats and Countermeasures of Network Flow Watermarking
[J]. Journal of Computer Research and Development, 2018, 55(8): 1785-1799.
|
[7] |
Tang Benxiao, Wang Lina, Wang Run, Zhao Lei, Wang Danlei.
A Defensive Method Against Android Physical Sensor-Based Side-Channel Attack Based on Differential Privacy
[J]. Journal of Computer Research and Development, 2018, 55(7): 1371-1392.
|
[8] |
Xiong Jinbo, Ma Rong, Niu Ben, Guo Yunchuan, Lin Li.
Privacy Protection Incentive Mechanism Based on User-Union Matching in Mobile Crowdsensing
[J]. Journal of Computer Research and Development, 2018, 55(7): 1359-1370.
|
[9] |
Yan Shu, Chen Fan, He Hongjie.
Reversible Data Hiding in Encrypted Image Based on Neighborhood Prediction Using XOR-Permutation Encryption
[J]. Journal of Computer Research and Development, 2018, 55(6): 1211-1221.
|
[10] |
Yan Xixi, Liu Yuan, Li Zichen, Tang Yongli.
Multi-Authority Attribute-Based Encryption Scheme with Privacy Protection
[J]. Journal of Computer Research and Development, 2018, 55(4): 846-853.
|
[11] |
Liu Hongyan, Xian Hequn, Lu Xiuqing, Hou Ruitao, Gao Yuan.
Verifiable Secure Data Deduplication Based on User-Defined Security Requirements
[J]. Journal of Computer Research and Development, 2018, 55(10): 2134-2148.
|
[12] |
Xu Wenyu, Wu Lei, Yan Yunxue.
Privacy-Preserving Scheme of Electronic Health Records Based on Blockchain and Homomorphic Encryption
[J]. Journal of Computer Research and Development, 2018, 55(10): 2233-2243.
|
[13] |
He Ming, Chang Mengmeng, Wu Xiaofei.
A Collaborative Filtering Recommendation Method Based on Differential Privacy
[J]. Journal of Computer Research and Development, 2017, 54(7): 1439-1451.
|
[14] |
Zhu Weijun, You Qingguang, Yang Weidong, Zhou Qinglei.
Trajectory Privacy Preserving Based on Statistical Differential Privacy
[J]. Journal of Computer Research and Development, 2017, 54(12): 2825-2832.
|
[15] |
Wu Xuangou, Wang Pengfei, Zheng Xiao, Fan Xu, Wang Xiaolin.
Trajectory Privacy Protection Based on Road Segment Report in VANETs
[J]. Journal of Computer Research and Development, 2017, 54(11): 2467-2474.
|