[1] |
Liu Feng, Yang Jie, Li Zhibin, Qi Jiayin.
A Secure Multi-Party Computation Protocol for Universal Data Privacy Protection Based on Blockchain
[J]. Journal of Computer Research and Development, 2021, 58(2): 281-290.
|
[2] |
Wei Lifei, Chen Congcong, Zhang Lei, Li Mengsi, Chen Yujiao, Wang Qin.
Security Issues and Privacy Preserving in Machine Learning
[J]. Journal of Computer Research and Development, 2020, 57(10): 2066-2085.
|
[3] |
Liu Hongyan, Xian Hequn, Lu Xiuqing, Hou Ruitao, Gao Yuan.
Verifiable Secure Data Deduplication Based on User-Defined Security Requirements
[J]. Journal of Computer Research and Development, 2018, 55(10): 2134-2148.
|
[4] |
Shen Liyan, Chen Xiaojun, Shi Jinqiao, Hu Lanlan.
Survey on Private Preserving Set Intersection Technology
[J]. Journal of Computer Research and Development, 2017, 54(10): 2153-2169.
|
[5] |
Zhao Shengnan, Jiang Han, Wei Xiaochao, Ke Junming, Zhao Minghao.
An Efficient Single Server-Aided k-out-of-n Oblivious Transfer Protocol
[J]. Journal of Computer Research and Development, 2017, 54(10): 2215-2223.
|
[6] |
Su Hui, Xu Ke, Shen Meng, Wang Yong, Zhong Yifeng, Li Tong.
Mobile Data Subsidy Model and Case Study
[J]. Journal of Computer Research and Development, 2016, 53(4): 861-872.
|
[7] |
Jiang Han, Xu Qiuliang.
Advances in Key Techniques of Practical Secure Multi-Party Computation
[J]. Journal of Computer Research and Development, 2015, 52(10): 2247-2257.
|
[8] |
Yang Hailu, Zhang Jianpei, and Yang Jing.
Community-Based Bidirectional Feedback System for Hybrid Worm Containment in Mobile Internet
[J]. Journal of Computer Research and Development, 2014, 51(2): 311-324.
|
[9] |
Li Zhiyuan, Bi Junlei, Wang Ruchuan.
Network Coding-Based Privacy Protection Scheme for Mobile P2P Networks
[J]. Journal of Computer Research and Development, 2014, 51(10): 2318-2328.
|
[10] |
Zhang En, and Cai Yongquan.
Rational Secure Two-Party Computation Protocol
[J]. , 2013, 50(7): 1409-1417.
|
[11] |
Fang Weiwei, Ren Jiang, and Xia Hongke.
Heterogeneous Distributed Linear Regression Privacy-Preserving Modeling
[J]. , 2011, 48(9): 1685-1692.
|
[12] |
Wang Ke and Dai Yiqi.
Secure Multiparty Computation of Statistical Distribution
[J]. , 2010, 47(2): 201-206.
|
[13] |
Luo Yonglong, Huang Liusheng, Jin Weiwei, and Xu Weijiang, .
Privacy Protection in the Relative Position Determination for Two Spatial Geometric Objects
[J]. , 2006, 43(3): 410-416.
|
[14] |
Qin Bo, Qin Hui, Wang Shangping, and Wang Yumin.
A Practical Electronic Auction with Bids Confidential
[J]. , 2006, 43(1): 28-32.
|
[15] |
Li Shundong, Si Tiange, and Dai Yiqi.
Secure Multi-Party Computation of Set-Inclusion and Graph-Inclusion
[J]. , 2005, 42(10): 1647-1653.
|