-
81
Two-party cooperative blind signature based on SM2
Published 2022-12-01Subjects: Get full text
Article -
82
Design of shuffling protocol based on additive secret sharing
Published 2024-08-01Subjects: Get full text
Article -
83
Lightweight privacy protection data auditing scheme for regenerating-coding-based distributed storage
Published 2021-07-01Subjects: Get full text
Article -
84
Survey on blockchain privacy protection techniques in cryptography
Published 2022-08-01Subjects: Get full text
Article -
85
Privacy protection system based on Hook for Android
Published 2018-04-01Subjects: “…privacy protection…”
Get full text
Article -
86
An improved Fully Homomorphic Encryption model based on N-Primes
Published 2019-10-01Subjects: Get full text
Article -
87
Assessment method on protection effectiveness of differential privacy algorithms based on fuzzy influence diagram
Published 2024-08-01Subjects: “…privacy protection effectiveness…”
Get full text
Article -
88
Fast handover authentication scheme in 5G mobile edge computing scenarios
Published 2022-06-01Subjects: Get full text
Article -
89
Edwards curves based security authentication protocol for mobile RFID systems
Published 2014-11-01Subjects: Get full text
Article -
90
Cloud data secure deduplication scheme via role-based symmetric encryption
Published 2018-05-01Subjects: Get full text
Article -
91
Distributed user privacy preserving adjustable personalized QoS prediction model for cloud services
Published 2023-04-01Subjects: Get full text
Article -
92
Research on protection technology for location privacy in VANET
Published 2012-08-01Subjects: Get full text
Article -
93
Research prospects of user information detection from encrypted traffic of mobile devices
Published 2021-02-01Subjects: Get full text
Article -
94
Research on batch anonymous authentication scheme for VANET based on bilinear pairing
Published 2017-06-01Subjects: Get full text
Article -
95
PCPIR-V:parallel privacy protected algorithms for nearest neighbor query based on Spark
Published 2016-05-01Subjects: “…query privacy protection,…”
Get full text
Article -
96
Research progress on secure data deduplication in cloud
Published 2016-11-01Subjects: Get full text
Article -
97
Privacy cloud storage scheme based on fog computing
Published 2019-03-01Subjects: Get full text
Article -
98
Two new nonrandomized response models for surveys on sensitive topics
Published 2025-01-01Subjects: Get full text
Article -
99
Online medical privacy protection strategy under information value-added mechanism
Published 2022-12-01Subjects: Get full text
Article -
100
Evaluation and protection of multi-level location privacy based on an information theoretic approach
Published 2019-12-01Subjects: “…multi-level location privacy protection…”
Get full text
Article