Citation: | Dai Hua, Yang Geng, Qin Xiaolin, Liu Liang. Privacy-Preserving Top-k Query Processing in Two-Tiered Wireless Sensor Networks[J]. Journal of Computer Research and Development, 2013, 50(6): 1239-1252. |
[1] | Huang Yicai, Yu Bin. Dynamic Searchable Symmetric Encryption Scheme for Conjunctive Queries Based on SHVE[J]. Journal of Computer Research and Development, 2024, 61(6): 1545-1558. DOI: 10.7544/issn1000-1239.202220924 |
[2] | Huang Yicai, Yu Bin, Li Sensen. A Searchable Symmetric Encryption Scheme Based on SRE[J]. Journal of Computer Research and Development, 2023, 60(12): 2725-2736. DOI: 10.7544/issn1000-1239.202220267 |
[3] | Yang Yaolin, He Hongjie, Chen Fan, Yuan Changqi. Reversible Data Hiding of Image Encryption Based on Prediction Error Adaptive Coding[J]. Journal of Computer Research and Development, 2021, 58(6): 1340-1350. DOI: 10.7544/issn1000-1239.2021.20200172 |
[4] | Zhao Liang, Wang Yongli, Du Zhongshu, Chen Guangsheng. HL-DAQ: A Dynamic Adaptive Quantization Coding for Hash Learning[J]. Journal of Computer Research and Development, 2018, 55(6): 1294-1307. DOI: 10.7544/issn1000-1239.2018.20170238 |
[5] | Wu Libing, Fan Jing, Wang Jing, Nie Lei, Wang Hao. Emergency Message Broadcast Method Based on Huffman-Like Coding[J]. Journal of Computer Research and Development, 2017, 54(11): 2475-2486. DOI: 10.7544/issn1000-1239.2017.20170368 |
[6] | Dai Hua, Yang Geng, Xiao Fu, Zhou Qiang, He Ruiliang. An Energy-Efficient and Privacy-Preserving Range Query Processing in Two-Tiered Wireless Sensor Networks[J]. Journal of Computer Research and Development, 2015, 52(4): 983-993. DOI: 10.7544/issn1000-1239.2015.20140066 |
[7] | Chen Wei, Xu Ruomei, Li Yuling. A Privacy-Preserving Integrity-Verification-Based Top-k Query Processing[J]. Journal of Computer Research and Development, 2014, 51(12): 2585-2592. DOI: 10.7544/issn1000-1239.2014.20140666 |
[8] | Dou Yi, Huang Haiping, Wang Ruchuan, Qin Xiaolin. Secure Range Query in Two-Tiered Wireless Sensor Networks[J]. Journal of Computer Research and Development, 2013, 50(6): 1253-1266. |
[9] | Xu Jian, Zhou Fucai, Yang Muzhou, Li Fuxiang, Zhu Zhiliang. Hierarchical Hash List for Distributed Query Authentication[J]. Journal of Computer Research and Development, 2012, 49(7): 1533-1544. |
[10] | Ding Zhenhua, Li Jintao, Feng Bo. Research on Hash-Based RFID Security Authentication Protocol[J]. Journal of Computer Research and Development, 2009, 46(4): 583-592. |