共 50 条
- [1] A Remote-Attestation-Based Extended Hash Algorithm for Privacy Protection [J]. 2017 INTERNATIONAL CONFERENCE ON COMPUTER NETWORK, ELECTRONIC AND AUTOMATION (ICCNEA), 2017, : 254 - 257
- [4] Image encryption algorithm based on lattice hash function and privacy protection [J]. Multimedia Tools and Applications, 2022, 81 : 18251 - 18277
- [6] FlashGhost: Data Sanitization with Privacy Protection Based on Frequent Colliding Hash Table [J]. 2019 IEEE INTERNATIONAL CONFERENCE ON SERVICES COMPUTING (IEEE SCC 2019), 2019, : 90 - 99
- [7] A new fair micropayment system based on hash chain [J]. 2004 IEEE INTERNATIONAL CONFERNECE ON E-TECHNOLOGY, E-COMMERE AND E-SERVICE, PROCEEDINGS, 2004, : 139 - 145
- [8] A Design of Mobile Phone Privacy Protection Based on Block Chain [J]. CLOUD COMPUTING AND SECURITY, PT IV, 2018, 11066 : 553 - 562
- [9] A Survey on Patients' Privacy and Safety Protection with EMR Applications in Primary Care [J]. 5TH EUROPEAN CONFERENCE OF THE INTERNATIONAL FEDERATION FOR MEDICAL AND BIOLOGICAL ENGINEERING, PTS 1 AND 2, 2012, 37 : 1132 - +
- [10] A Privacy Protection Protocol For RFID-enabled Supply Chain System [J]. 2009 6TH INTERNATIONAL CONFERENCE ON SERVICE SYSTEMS AND SERVICE MANAGEMENT, VOLS 1 AND 2, 2009, : 161 - +