-
41
Achieving efficient location privacy protection based on cache
Published 2017-06-01Subjects: Get full text
Article -
42
Multi-authority attribute hidden for electronic medical record sharing scheme based on blockchain
Published 2022-08-01Subjects: Get full text
Article -
43
Convolutional neural network model over encrypted data based on functional encryption
Published 2024-03-01Subjects: Get full text
Article -
44
Android application privacy protection mechanism based on virtual machine bytecode injection
Published 2021-06-01Subjects: Get full text
Article -
45
Provable secure ownership transfer protocol for RFID tag
Published 2015-08-01Subjects: Get full text
Article -
46
Method of ciphertext retrieval in mobile edge computing based on block segmentation
Published 2020-07-01Subjects: Get full text
Article -
47
Research and prospect of reversible data hiding method with contrast enhancement
Published 2016-04-01Subjects: Get full text
Article -
48
CP-ABE based users collaborative privacy protection scheme for continuous query
Published 2017-09-01Subjects: Get full text
Article -
49
-
50
Adaptable privacy protection scheme in JPEG images
Published 2024-02-01Subjects: Get full text
Article -
51
Method of constructing an anonymous graph based on information loss estimation
Published 2016-06-01Subjects: Get full text
Article -
52
Design of blockchain based zero-knowledge proof of location system
Published 2020-04-01Subjects: Get full text
Article -
53
Research progress of access control based on blockchain
Published 2021-12-01Subjects: Get full text
Article -
54
Bus cache-based location privacy protection scheme in the Internet of vehicles
Published 2021-07-01Subjects: Get full text
Article -
55
LBS-oriented location privacy protection model and scheme
Published 2014-08-01Subjects: “…privacy protection…”
Get full text
Article -
56
Blockchain-based cross-data center anonymous and verifiable identity authentication scheme
Published 2024-04-01Subjects: Get full text
Article -
57
Survey on anonymous authentication mechanisms of VANET
Published 2016-08-01Subjects: Get full text
Article -
58
Personalized privacy protection method for group recommendation
Published 2019-09-01Subjects: Get full text
Article -
59
Privacy protection key distribution protocol for edge computing
Published 2021-02-01Subjects: Get full text
Article -
60
Analysis on anonymity and regulation of digital currency transactions based on game theory
Published 2022-10-01Subjects: Get full text
Article