计算机研究与发展
       ISSN 1000-1239   CN 11-1777/TP  
   RSS  Email Alert     
   
 
Nianqi Search Key words Adv search
33
2018 Vol. 55, No. 10
Published: 01 October 2018

   
 
2099 Research on Scalability of Blockchain Technology: Problems and Methods Hot!
Pan Chen, Liu Zhiqiang, Liu Zhen, Long Yu
DOI: 10.7544/issn1000-1239.2018.20180440
2018 Vol. 55 (10): 2099-2110 [Abstract] ( 1058 ) HTML (99 KB)  PDF (2158 KB)  ( 727 )
2111 Survey of Smart Home Security Hot!
Wang Jice, Li Yilian, Jia Yan, Zhou Wei, Wang Yucheng, Wang He, Zhang Yuqing
DOI: 10.7544/issn1000-1239.2018.20180585
2018 Vol. 55 (10): 2111-2124 [Abstract] ( 753 ) HTML (105 KB)  PDF (2535 KB)  ( 614 )
2125 An Efficient and Secure Three-Party Wildcard Pattern Matching Protocol
Wei Xiaochao, Zheng Zhihua, Wang Hao
DOI: 10.7544/issn1000-1239.2018.20180418
2018 Vol. 55 (10): 2125-2133 [Abstract] ( 324 ) HTML (98 KB)  PDF (1309 KB)  ( 207 )
2134 Verifiable Secure Data Deduplication Based on User-Defined Security Requirements
Liu Hongyan, Xian Hequn, Lu Xiuqing, Hou Ruitao, Gao Yuan
DOI: 10.7544/issn1000-1239.2018.20180441
2018 Vol. 55 (10): 2134-2148 [Abstract] ( 276 ) HTML (154 KB)  PDF (4384 KB)  ( 218 )
2149 Multiple-Keyword Encrypted Search with Relevance Ranking on Dual-Server Model
Li Yuxi, Zhou Fucai, Xu Jian, Xu Zifeng
DOI: 10.7544/issn1000-1239.2018.20180433
2018 Vol. 55 (10): 2149-2163 [Abstract] ( 229 ) HTML (249 KB)  PDF (2920 KB)  ( 206 )
2164 Identity-Based Threshold Decryption Scheme from Lattices under the Standard Model
Wu Liqiang, Yang Xiaoyuan, Zhang Minqing
DOI: 10.7544/issn1000-1239.2018.20180446
2018 Vol. 55 (10): 2164-2173 [Abstract] ( 203 ) HTML (193 KB)  PDF (1162 KB)  ( 191 )
2174 Ciphertext-Only Fault Analysis of the LBlock Lightweight Cipher
Li Wei, Wu Yixin, Gu Dawu, Cao Shan, Liao Linfeng, Sun Li, Liu Ya, Liu Zhiqiang
DOI: 10.7544/issn1000-1239.2018.20180437
2018 Vol. 55 (10): 2174-2184 [Abstract] ( 239 ) HTML (87 KB)  PDF (2495 KB)  ( 168 )
2185 Full Anonymous Blockchain Based on Aggregate Signature and Confidential Transaction
Wang Ziyu, Liu Jianwei, Zhang Zongyang, Yu Hui
DOI: 10.7544/issn1000-1239.2018.20180430
2018 Vol. 55 (10): 2185-2198 [Abstract] ( 696 ) HTML (143 KB)  PDF (3342 KB)  ( 487 )
2199 Blockchain-Based Verification Scheme for Deletion Operation in Cloud
Liu Yining, Zhou Yuanjian, Lan Rushi, Tang Chunming
DOI: 10.7544/issn1000-1239.2018.20180436
2018 Vol. 55 (10): 2199-2207 [Abstract] ( 432 ) HTML (104 KB)  PDF (1811 KB)  ( 354 )
2208 Improvement of the PoS Consensus Mechanism in Blockchain Based on Shapley Value
Liu Yiran, Ke Junming, Jiang Han, Song Xiangfu
DOI: 10.7544/issn1000-1239.2018.20180439
2018 Vol. 55 (10): 2208-2218 [Abstract] ( 362 ) HTML (122 KB)  PDF (1804 KB)  ( 329 )
2219 A Regulatable Digital Currency Model Based on Blockchain
Zhang Jianyi, Wang Zhiqiang, Xu Zhili, Ouyang Yafei, Yang Tao
DOI: 10.7544/issn1000-1239.2018.20180426
2018 Vol. 55 (10): 2219-2232 [Abstract] ( 803 ) HTML (107 KB)  PDF (3824 KB)  ( 432 )
2233 Privacy-Preserving Scheme of Electronic Health Records Based on Blockchain and Homomorphic Encryption
Xu Wenyu, Wu Lei, Yan Yunxue
DOI: 10.7544/issn1000-1239.2018.20180438
2018 Vol. 55 (10): 2233-2243 [Abstract] ( 623 ) HTML (115 KB)  PDF (1970 KB)  ( 543 )
2244 Regional Cooperative Authentication Protocol for LEO Satellite Networks Based on Consensus Mechanism
Wei Songjie, Li Shuai, Mo Bing, Wang Jiahe
DOI: 10.7544/issn1000-1239.2018.20180431
2018 Vol. 55 (10): 2244-2255 [Abstract] ( 204 ) HTML (75 KB)  PDF (4667 KB)  ( 176 )
2256 Formal Modeling and Factor Analysis for Vulnerability Propagation Oriented to SDN
Wang Jian, Zhao Guosheng, Zhao Zhongnan, Li Ke
DOI: 10.7544/issn1000-1239.2018.20180447
2018 Vol. 55 (10): 2256-2268 [Abstract] ( 209 ) HTML (126 KB)  PDF (5033 KB)  ( 174 )
2269 Reverse-Analysis of S-Box for GIFT-Like Algorithms Based on Independent Component Analysis Technology
Ma Xiangliang, Li Bing, Xi Wei, Chen Hua, Chen Caisen
DOI: 10.7544/issn1000-1239.2018.20180427
2018 Vol. 55 (10): 2269-2277 [Abstract] ( 213 ) HTML (84 KB)  PDF (3337 KB)  ( 161 )
2278 A Memory Forensic Method Based on Hidden Event Trigger Mechanism
Cui Chaoyuan, Li Yonggang, Wu Yun, Wang Licheng
DOI: 10.7544/issn1000-1239.2018.20180405
2018 Vol. 55 (10): 2278-2290 [Abstract] ( 185 ) HTML (79 KB)  PDF (6101 KB)  ( 224 )
2291 Research Progress of Recommendation Technology in Location-Based Social Networks
Jiao Xu, Xiao Yingyuan, Zheng Wenguang, Zhu Ke
DOI: 10.7544/issn1000-1239.2018.20170489
2018 Vol. 55 (10): 2291-2306 [Abstract] ( 277 ) HTML (135 KB)  PDF (4687 KB)  ( 355 )
2307 Personalized Investment Recommendation in P2P Lending Considering Friend Relationships and Expected Utilities of Investors
Wan Changxuan, You Yun, Jiang Tengjiao, Liu Xiping, Liao Guoqiong, Liu Dexi
DOI: 10.7544/issn1000-1239.2018.20170632
2018 Vol. 55 (10): 2307-2320 [Abstract] ( 209 ) HTML (140 KB)  PDF (4574 KB)  ( 200 )
2321 A Feature Selection Method for Small Samples
Xu Hang, Zhang Kai, Wang Wenjian
DOI: 10.7544/issn1000-1239.2018.20170748
2018 Vol. 55 (10): 2321-2330 [Abstract] ( 381 ) HTML (76 KB)  PDF (1796 KB)  ( 335 )
2331 Variable Dependent Relation Analysis in Program State Condition Merging
Guo Xi, Wang Pan
DOI: 10.7544/issn1000-1239.2018.20170545
2018 Vol. 55 (10): 2331-2342 [Abstract] ( 206 ) HTML (128 KB)  PDF (2515 KB)  ( 191 )
计算机研究与发展
·
·
·
·
·
·
·F5000
·
More....  
More....  
EI Village
China Computer Federation
Institute of Computing, Chinese Academy of Sciences
More....  
 
 
Copyright © Editorial Board of Journal of Computer Research and Development
Supported by:Beijing Magtech