共 50 条
- [41] Outsourced Privacy-Preserving kNN Classifier Model Based on Multi-Key Homomorphic Encryption [J]. INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2023, 37 (02): : 1421 - 1436
- [44] Multi-key spatio-temporal chaotic image encryption and retrieval scheme [J]. NONLINEAR DYNAMICS, 2024, 112 (04) : 3003 - 3025
- [45] Multi-key spatio-temporal chaotic image encryption and retrieval scheme [J]. Nonlinear Dynamics, 2024, 112 (4) : 3003 - 3025
- [46] Poster: Control-Flow Integrity in Low-end Embedded Devices [J]. PROCEEDINGS OF THE 2023 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2023, 2023, : 3618 - 3620
- [47] Searchable Public Key Encryption Scheme with Data Integrity Checking [J]. ADVANCES ON BROAD-BAND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS, 2017, 2 : 363 - 370
- [48] Using Merkle's Puzzle for Key agreement with Low-end Devices [J]. 2009 IEEE 34TH CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN 2009), 2009, : 858 - +
- [49] Block chain enabled auditing with optimal multi-key homomorphic encryption technique for public cloud computing environment [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (22):