[1] |
Wang Huiyong, Tang Shijie, Ding Yong, Wang Yujue, Li Jiahui.
Survey on Biometrics Template Protection
[J]. Journal of Computer Research and Development, 2020, 57(5): 1003-1021.
|
[2] |
Gao Jiaxin, Sun Jiameng, Qin Jing.
Traceable Outsourcing Attribute-Based Encryption with Attribute Revocation
[J]. Journal of Computer Research and Development, 2019, 56(10): 2160-2169.
|
[3] |
Cao Yan, Huang Zhiqiu, Kan Shuanglong, Peng Huanfeng,Ke Changbo.
Location-Constrained Access Control Model and Verification Methods
[J]. Journal of Computer Research and Development, 2018, 55(8): 1809-1825.
|
[4] |
Wang Guangbo, Liu Haitao, Wang Chenlu, Wang Pengcheng, Lian Lin, Hui Wentao.
Revocable Attribute Based Encryption in Cloud Storage
[J]. Journal of Computer Research and Development, 2018, 55(6): 1190-1200.
|
[5] |
Liu Qiang, Li Tong, Yu Yang, Cai Zhiping, Zhou Tongqing.
Data Security and Privacy Preserving Techniques for Wearable Devices: A Survey
[J]. Journal of Computer Research and Development, 2018, 55(1): 14-29.
|
[6] |
Zhang Kai, Ma Jianfeng, Zhang Junwei, Ying Zuobin, Zhang Tao, Liu Ximeng.
Online/Offline Traceable Attribute-Based Encryption
[J]. Journal of Computer Research and Development, 2018, 55(1): 216-224.
|
[7] |
Shi Jiaoli, Huang Chuanhe, He Kai, Shen Xieyang, Hua Chao.
An Access Control Method Supporting Multi-User Collaborative Edit in Cloud Storage
[J]. Journal of Computer Research and Development, 2017, 54(7): 1603-1616.
|
[8] |
Su Hang, Zhu Zhiqiang, Sun Lei.
Attribute-Based Encryption with Keyword Search in Mobile Cloud Storage
[J]. Journal of Computer Research and Development, 2017, 54(10): 2369-2377.
|
[9] |
Wang Huifeng, Li Zhanhuai, Zhang Xiao, Sun Jian, Zhao Xiaonan.
A Self-Adaptive Audit Method of Data Integrity in the Cloud Storage
[J]. Journal of Computer Research and Development, 2017, 54(1): 172-183.
|
[10] |
Cao Zhenfu, Dong Xiaolei, Zhou Jun, Shen Jiachen, Ning Jianting, Gong Junqing.
Research Advances on Big Data Security and Privacy Preserving
[J]. Journal of Computer Research and Development, 2016, 53(10): 2137-2151.
|
[11] |
Zhang Kai, Wei Lifei, Li Xiangxue, Chen Jie, Qian Haifeng.
An Efficient and Expressive Attribute-Based Encryption Scheme with Chosen Ciphertext Security
[J]. Journal of Computer Research and Development, 2016, 53(10): 2239-2247.
|
[12] |
Zhang Weiwei, Feng Gui, Liu Jianyi, Yang Yixian.
A DRM Scheme Supporting Attribute Revocation and Outsourced Decryption in the Cloud Computing Environment
[J]. Journal of Computer Research and Development, 2015, 52(12): 2659-2668.
|
[13] |
Zhang Xing, Wen Zilong, Shen Qingni, Fang Yuejian, Wu Zhonghai.
Accountable Attribute-Based Encryption Scheme Without Key Escrow
[J]. Journal of Computer Research and Development, 2015, 52(10): 2293-2303.
|
[14] |
Fu Yingxun, Luo Shengmei, and Shu Jiwu.
Survey of Secure Cloud Storage System and Key Technologies
[J]. 计算机研究与发展, 2013, 50(1): 136-145.
|
[15] |
Ren Wei, Ren Yi, Zhang Hui, and Zhao Junge.
A Secure and Efficient Data Survival Strategy in Unattended Wireless Sensor Network
[J]. , 2009, 46(12): 2093-2100.
|