[1] |
Liu Feng, Yang Jie, Li Zhibin, Qi Jiayin.
A Secure Multi-Party Computation Protocol for Universal Data Privacy Protection Based on Blockchain
[J]. Journal of Computer Research and Development, 2021, 58(2): 281-290.
|
[2] |
Wei Lifei, Chen Congcong, Zhang Lei, Li Mengsi, Chen Yujiao, Wang Qin.
Security Issues and Privacy Preserving in Machine Learning
[J]. Journal of Computer Research and Development, 2020, 57(10): 2066-2085.
|
[3] |
Feng Qi, He Debiao, Luo Min, Li Li.
Efficient Two-Party SM2 Signing Protocol for Mobile Internet
[J]. Journal of Computer Research and Development, 2020, 57(10): 2136-2146.
|
[4] |
Wei Xiaochao, Xu Lin, Zheng Zhihua, Wang Hao.
Efficient and Secure Cloud-Assisted Pattern Matching Protocol for Intelligent Environment
[J]. Journal of Computer Research and Development, 2019, 56(11): 2365-2374.
|
[5] |
Wei Xiaochao, Zheng Zhihua, Wang Hao.
An Efficient and Secure Three-Party Wildcard Pattern Matching Protocol
[J]. Journal of Computer Research and Development, 2018, 55(10): 2125-2133.
|
[6] |
Liu Hongyan, Xian Hequn, Lu Xiuqing, Hou Ruitao, Gao Yuan.
Verifiable Secure Data Deduplication Based on User-Defined Security Requirements
[J]. Journal of Computer Research and Development, 2018, 55(10): 2134-2148.
|
[7] |
Shen Liyan, Chen Xiaojun, Shi Jinqiao, Hu Lanlan.
Survey on Private Preserving Set Intersection Technology
[J]. Journal of Computer Research and Development, 2017, 54(10): 2153-2169.
|
[8] |
Wei Xiaochao, Jiang Han, Zhao Chuan.
An Efficient 1-out-of-n Oblivious Transfer Protocol with Full Simulation
[J]. Journal of Computer Research and Development, 2016, 53(11): 2475-2481.
|
[9] |
Jiang Han, Xu Qiuliang.
Advances in Key Techniques of Practical Secure Multi-Party Computation
[J]. Journal of Computer Research and Development, 2015, 52(10): 2247-2257.
|
[10] |
Zhang En, and Cai Yongquan.
Rational Secure Two-Party Computation Protocol
[J]. , 2013, 50(7): 1409-1417.
|
[11] |
Fang Weiwei, Ren Jiang, and Xia Hongke.
Heterogeneous Distributed Linear Regression Privacy-Preserving Modeling
[J]. , 2011, 48(9): 1685-1692.
|
[12] |
Wang Ke and Dai Yiqi.
Secure Multiparty Computation of Statistical Distribution
[J]. , 2010, 47(2): 201-206.
|
[13] |
Luo Yonglong, Huang Liusheng, Jin Weiwei, and Xu Weijiang, .
Privacy Protection in the Relative Position Determination for Two Spatial Geometric Objects
[J]. , 2006, 43(3): 410-416.
|
[14] |
Qin Bo, Qin Hui, Wang Shangping, and Wang Yumin.
A Practical Electronic Auction with Bids Confidential
[J]. , 2006, 43(1): 28-32.
|
[15] |
Li Shundong, Si Tiange, and Dai Yiqi.
Secure Multi-Party Computation of Set-Inclusion and Graph-Inclusion
[J]. , 2005, 42(10): 1647-1653.
|