[1] |
XIE Jia, HU Yupu, GAO Juntao, WANG Baocang, JIANG Mingming.
Forward Secure Lattice-Based Sequential Aggregate Signature Schemes in Stan-dard Model
[J]. Journal of Frontiers of Computer Science and Technology, 2021, 15(10): 1912-1920.
|
[2] |
FAN Xing, NIU Baoning.
BBF: Bloom Filter Variant for Blockchain
[J]. Journal of Frontiers of Computer Science and Technology, 2021, 15(10): 1921-1929.
|
[3] |
ZHOU Jian, SUN Liyan, FU Ming.
Research on Wallet Protection Against Currency Failure in Blockchain
[J]. Journal of Frontiers of Computer Science and Technology, 2020, 14(12): 2039-2049.
|
[4] |
ZHENG Lianghan, HE Heng, TONG Qian, YANG Xiang, CHEN Xiang.
Multi-authority Access Control Scheme in Cloud Environment
[J]. Journal of Frontiers of Computer Science and Technology, 2020, 14(11): 1865-1878.
|
[5] |
WANG Qun, LI Fujuan, WANG Zhenli, LIANG Guangjun, XU Jie.
Principle and Core Technology of Blockchain
[J]. Journal of Frontiers of Computer Science and Technology, 2020, 14(10): 1621-1643.
|
[6] |
DONG Xiangxiang, GAO Ang, LIANG Ying, BI Xiaodi.
Method of Privacy Preserving in Dynamic Social Network Data Publication
[J]. Journal of Frontiers of Computer Science and Technology, 2019, 13(9): 1441-1458.
|
[7] |
ZHAO Zongqu, FAN Tao, PENG Tingting, YE Qing, QIN Panke.
Key Encapsulation Mechanism from Lattice in Standard Model
[J]. Journal of Frontiers of Computer Science and Technology, 2019, 13(4): 629-638.
|
[8] |
ZHANG Xiaolin, HE Xiaoyu, ZHANG Huanxiang, LI Zhuolin.
PLRD-(k,m):Distributed k-Degree-m-Label Anonymity with Protecting Link Rela-tionships
[J]. Journal of Frontiers of Computer Science and Technology, 2019, 13(1): 70-82.
|
[9] |
LI Wen, HUANG Lishao, LUO Entao.
Anonymous Privacy Protection Model with Individual l-Diversity in Mobile Health
[J]. Journal of Frontiers of Computer Science and Technology, 2018, 12(5): 761-768.
|
[10] |
JIA Dayu, XIN Junchang, WANG Zhiqiong, GUO Wei, WANG Guoren.
Storage Capacity Scalable Model for Blockchain
[J]. Journal of Frontiers of Computer Science and Technology, 2018, 12(4): 525-535.
|
[11] |
TANG Yongli, ZHOU Jin, LIU Kun, YE Qing, YAN Xixi.
Lattice-Based Identity-Based Blind Signature Scheme in Standard Model
[J]. Journal of Frontiers of Computer Science and Technology, 2017, 11(12): 1965-1971.
|
[12] |
ZHENG Luqian, HAN Jianmin, LU Jianfeng, PENG Hao, GUO Hui.
(k,δ,l)-Anonymity Model to Resist Spatio-Temporal Point Linkage Attack
[J]. Journal of Frontiers of Computer Science and Technology, 2015, 9(9): 1108-1121.
|
[13] |
CUI Wei, LIU Wen, LI Yang, GONG Zhe, YUAN Kaiguo.
Efficient Proxy Signature Scheme in Standard Model
[J]. Journal of Frontiers of Computer Science and Technology, 2012, 6(3): 248-256.
|
[14] |
HE Xianmang, CHEN Huahui, XIAO Yanghua, WANG Wei, SHI Bole.
Data Privacy Preservation for Dynamic Numerical Sensitive Attributes
[J]. Journal of Frontiers of Computer Science and Technology, 2011, 5(8): 740-750.
|
[15] |
WANG Danli1+, LIU Guohua1,2,3, SONG Jinling1,4, LI Fangling5.
Problem of Finding the Optimal Value on Quasi-Identifier for k-Anonymity Model*
[J]. Journal of Frontiers of Computer Science and Technology, 2010, 4(11): 1010-1018.
|