[1] |
Zhou Jun, Shen Huajie, Lin Zhongyun, Cao Zhenfu, Dong Xiaolei.
Research Advances on Privacy Preserving in Edge Computing
[J]. Journal of Computer Research and Development, 2020, 57(10): 2027-2051.
|
[2] |
Qin Hong, Wang Hao, Wei Xiaochao, Zheng Zhihua.
Secure Constant-Round Multi-User k-Means Clustering Protocol
[J]. Journal of Computer Research and Development, 2020, 57(10): 2188-2200.
|
[3] |
Dong Ye, Hou Wei, Chen Xiaojun, Zeng Shuai.
Efficient and Secure Federated Learning Based on Secret Sharing and Gradients Selection
[J]. Journal of Computer Research and Development, 2020, 57(10): 2241-2250.
|
[4] |
Wei Xiaochao, Xu Lin, Zheng Zhihua, Wang Hao.
Efficient and Secure Cloud-Assisted Pattern Matching Protocol for Intelligent Environment
[J]. Journal of Computer Research and Development, 2019, 56(11): 2365-2374.
|
[5] |
Hu Hao, Shen Gang, Yu Bin,Mahao Junfu.
XOR-Based Region Incrementing Visual Cryptography Scheme by Random Grids
[J]. Journal of Computer Research and Development, 2016, 53(8): 1857-1866.
|
[6] |
Jiang Han, Xu Qiuliang.
Secure Multiparty Computation in Cloud Computing
[J]. Journal of Computer Research and Development, 2016, 53(10): 2152-2162.
|
[7] |
Li Shundong, Dou Jiawei, Wang Daoshun.
Survey on Homomorphic Encryption and Its Applications to Cloud Security
[J]. Journal of Computer Research and Development, 2015, 52(6): 1378-1388.
|
[8] |
Liu Hai, Li Xinghua, Ma Jianfeng.
Rational Secret Sharing Scheme Based on Reconstruction Order Adjustment Mechanism
[J]. Journal of Computer Research and Development, 2015, 52(10): 2332-2340.
|
[9] |
Peng Changgen1,2, Liu Hai1,2, Tian Youliang1,2,3, Lü Zhen1,2, and Liu Rongfei1,2.
A Distributed Rational Secret Sharing Scheme with Hybrid Preference Model
[J]. 计算机研究与发展, 2014, 51(7): 1476-1485.
|
[10] |
Li Ximing, Yang Bo, Guo Yubin, and Yao Jintao.
A New Key Hiding Scheme Based on Fingerprint
[J]. , 2013, 50(3): 532-539.
|
[11] |
Zhou Yousheng,, Wang Feng,, Qing Sihan, Yang Yixian, and Niu Xinxin.
Dynamic Multi-Secret Sharing Scheme Based on Cellular Automata
[J]. , 2012, 49(9): 1999-2004.
|
[12] |
Zhang Wenfang, Wang Xiaomin, and He Dake,.
An Improved VCA Interaction Model for Virtual Enterprises Based on Threshold RSA Signature
[J]. , 2012, 49(8): 1662-1667.
|
[13] |
Qin Chuan, Chang Chin Chen, and Guo Cheng .
Perceptual Robust Image Hashing Scheme Based on Secret Sharing
[J]. , 2012, 49(8): 1690-1698.
|
[14] |
Ye Jianwei, Zhang Hongli, and Zhang Yongzheng.
A Secure Mobile Code Protocol Based on Committed Garbled Circuit
[J]. , 2011, 48(5): 862-868.
|
[15] |
Wang Gang, Wen Tao, Guo Quan, and Ma Xuebin.
An Efficient and Secure Group Key Management Scheme in Mobile Ad Hoc Networks
[J]. , 2010, 47(5): 911-920.
|