• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search

Principle and Research Progress of Quantum Computation and Quantum Cryptography
Wang Yongli, Xu Qiuliang
2020, 57(10): 2015-2026. DOI: 10.7544/issn1000-1239.2020.20200615
Abstract PDF
Research Advances on Privacy Preserving in Edge Computing
Zhou Jun, Shen Huajie, Lin Zhongyun, Cao Zhenfu, Dong Xiaolei
2020, 57(10): 2027-2051. DOI: 10.7544/issn1000-1239.2020.20200614
Abstract PDF
Overview of Threat Intelligence Sharing and Exchange in Cybersecurity
Lin Yue, Liu Peng, Wang He, Wang Wenjie, Zhang Yuqing
2020, 57(10): 2052-2065. DOI: 10.7544/issn1000-1239.2020.20200616
Abstract PDF
Security Issues and Privacy Preserving in Machine Learning
Wei Lifei, Chen Congcong, Zhang Lei, Li Mengsi, Chen Yujiao, Wang Qin
2020, 57(10): 2066-2085. DOI: 10.7544/issn1000-1239.2020.20200426
Abstract PDF
Comparisons and Optimizations of Key Encapsulation Mechanisms Based on Module Lattices
Wang Yang, Shen Shiyu, Zhao Yunlei, Wang Mingqiang
2020, 57(10): 2086-2103. DOI: 10.7544/issn1000-1239.2020.20200452
Abstract PDF
A Multi-User Forward Secure Dynamic Symmetric Searchable Encryption with Enhanced Security
Lu Bingjie, Zhou Jun, Cao Zhenfu
2020, 57(10): 2104-2116. DOI: 10.7544/issn1000-1239.2020.20200439
Abstract PDF
Circular Secure Homomorphic Encryption Scheme
Zhao Xiufeng, Fu Yu, Song Weitao
2020, 57(10): 2117-2124. DOI: 10.7544/issn1000-1239.2020.20200422
Abstract PDF
Public-Key Authenticated Encryption with Keyword Search Without Pairings
Yang Ningbin, Zhou Quan, Xu Shumei
2020, 57(10): 2125-2135. DOI: 10.7544/issn1000-1239.2020.20200318
Abstract PDF
Efficient Two-Party SM2 Signing Protocol for Mobile Internet
Feng Qi, He Debiao, Luo Min, Li Li
2020, 57(10): 2136-2146. DOI: 10.7544/issn1000-1239.2020.20200401
Abstract PDF
A Dynamic S-Box Construction and Application Scheme of ZUC Based on Chaotic System
Han Yanyan, He Yanru, Liu Peihe, Zhang Duo, Wang Zhiqiang, He Wencai
2020, 57(10): 2147-2157. DOI: 10.7544/issn1000-1239.2020.20200466
Abstract PDF
A Composable Authentication Key Exchange Scheme with Post-Quantum Forward Secrecy
Chen Ming
2020, 57(10): 2158-2176. DOI: 10.7544/issn1000-1239.2020.20200472
Abstract PDF
Server-Aided and Verifiable Attribute-Based Signature for Industrial Internet of Things
Zhang Yinghui, He Jiangyong, Guo Rui, Zheng Dong
2020, 57(10): 2177-2187. DOI: 10.7544/issn1000-1239.2020.20200421
Abstract PDF
Secure Constant-Round Multi-User k-Means Clustering Protocol
Qin Hong, Wang Hao, Wei Xiaochao, Zheng Zhihua
2020, 57(10): 2188-2200. DOI: 10.7544/issn1000-1239.2020.20200407
Abstract PDF
Template Protection of Speaker Recognition Based on Random Mapping Technology
Ding Yong, Li Jiahui, Tang Shijie, Wang Huiyong
2020, 57(10): 2201-2208. DOI: 10.7544/issn1000-1239.2020.20200474
Abstract PDF
A Spectrum Sharing Incentive Scheme Against Location Privacy Leakage in IoT Networks
Feng Jingyu, Yang Jinwen, Zhang Ruitong, Zhang Wenbo
2020, 57(10): 2209-2220. DOI: 10.7544/issn1000-1239.2020.20200453
Abstract PDF
Privacy-Preserving Statistics Protocol for Set-Based Computation
Song Xiangfu, Gai Min, Zhao Shengnan, Jiang Han
2020, 57(10): 2221-2231. DOI: 10.7544/issn1000-1239.2020.20200444
Abstract PDF
ACT: Auditable Confidential Transaction Scheme
Jiang Yihan, Li Yong, Zhu Yan
2020, 57(10): 2232-2240. DOI: 10.7544/issn1000-1239.2020.20200400
Abstract PDF
Efficient and Secure Federated Learning Based on Secret Sharing and Gradients Selection
Dong Ye, Hou Wei, Chen Xiaojun, Zeng Shuai
2020, 57(10): 2241-2250. DOI: 10.7544/issn1000-1239.2020.20200463
Abstract PDF