[1] |
Zhou Jun, Shen Huajie, Lin Zhongyun, Cao Zhenfu, Dong Xiaolei.
Research Advances on Privacy Preserving in Edge Computing
[J]. Journal of Computer Research and Development, 2020, 57(10): 2027-2051.
|
[2] |
Zhou Jun, Dong Xiaolei, Cao Zhenfu.
Research Advances on Privacy Preserving in Recommender Systems
[J]. Journal of Computer Research and Development, 2019, 56(10): 2033-2048.
|
[3] |
Dong Xiaolei, Zhou Jun, Cao Zhenfu.
Research Advances on Secure Searchable Encryption
[J]. Journal of Computer Research and Development, 2017, 54(10): 2107-2120.
|
[4] |
Cao Zhenfu, Dong Xiaolei, Zhou Jun, Shen Jiachen, Ning Jianting, Gong Junqing.
Research Advances on Big Data Security and Privacy Preserving
[J]. Journal of Computer Research and Development, 2016, 53(10): 2137-2151.
|
[5] |
Jiang Han, Xu Qiuliang.
Secure Multiparty Computation in Cloud Computing
[J]. Journal of Computer Research and Development, 2016, 53(10): 2152-2162.
|
[6] |
Xiao Siyu, Ge Aijun, Ma Chuangui.
Decentralized Attribute-Based Encryption Scheme with Constant-Size Ciphertexts
[J]. Journal of Computer Research and Development, 2016, 53(10): 2207-2215.
|
[7] |
Ke Yan, Zhang Minqing, Su Tingting.
A Novel Multiple Bits Reversible Data Hiding in Encrypted Domain Based on R-LWE
[J]. Journal of Computer Research and Development, 2016, 53(10): 2307-2322.
|
[8] |
Dong Xiaolei.
Advances of Privacy Preservation in Internet of Things
[J]. Journal of Computer Research and Development, 2015, 52(10): 2341-2352.
|
[9] |
Yang Bo1,2, Feng Dengguo1, Qin Yu1, Zhang Qianying1,2, Xi Li1,2, and Zheng Changwen3.
Research on Direct Anonymous Attestation Scheme Based on Trusted Mobile Platform
[J]. 计算机研究与发展, 2014, 51(7): 1436-1445.
|
[10] |
Yuan Chunyang, Xu Junfeng, and Zhu Chunge,.
A Trusted Recovery Model for Assurance of Integrity Policy Validity
[J]. Journal of Computer Research and Development, 2014, 51(2): 360-372.
|
[11] |
Liu Mingjie, Wang An.
Fully Homomorphic Encryption and Its Applications
[J]. Journal of Computer Research and Development, 2014, 51(12): 2593-2603.
|
[12] |
Liu Duo and Dai Yiqi.
Construction of Transformation Matrix with a Given Period Modulo N
[J]. , 2012, 49(5): 925-931.
|
[13] |
Zhang Huanguo, Li Jing, Pan Danling, and Zhao Bo.
Trusted Platform Module in Embedded System
[J]. , 2011, 48(7): 1269-1278.
|
[14] |
Qian Yuwen, Zhao Bangxin, Kong Jianshou, and Wang Zhiquan.
Robust Covert Timing Channel Based on Web
[J]. , 2011, 48(3): 423-431.
|
[15] |
Wang Yazhe and Feng Dengguo.
A Survey of Research on Inter-Domain Authorization Interoperation
[J]. , 2010, 47(10): 1673-1689.
|