[1] |
Yue ZHANG, Xiuxia TIAN, Yuncheng YAN, Guanyu LU.
Power marketing big data access control scheme based on a multi-level strategy
[J]. Journal of East China Normal University(Natural Science), 2021, 2021(5): 169-184.
|
[2] |
JIA Zhong-xiang, LIU Yin-ping.
Novel image encryption algorithm based on self-adaptive diffusion and combined global scrambling
[J]. Journal of East China Normal University(Natural Sc, 2019, 2019(6): 61-72.
|
[3] |
SONG Chun-zhi, DONG Xiao-lei, CAO Zhen-fu.
Efficient verifiable privacy-preserving recommendation system
[J]. Journal of East China Normal University(Natural Sc, 2018, 2018(2): 41-51,62.
|
[4] |
TIAN Xiu-xia, LI Li-sha, ZHAO Chuan-qiang, TIAN Fu-liang, SONG Qian.
Smart meter:Privacy-preserving power request scheme
[J]. Journal of East China Normal University(Natural Sc, 2017, 2017(5): 87-100.
|
[5] |
TIAN Xiuxia1,LI Lisha2,SUN Chaochao1,LIU Daming1.
Review on privacy protection approaches in smart meter
[J]. Journal of East China Normal University(Natural Sc, 2015, 2015(5): 46-60.
|
[6] |
QIU Ming,PI De-chang.
Trajectory privacy preserving algorithm based on trajectory direction
[J]. Journal of East China Normal University(Natural Sc, 2015, 2015(5): 88-95.
|
[7] |
Bao Ting, Zhang Zhi-gang, Jin Che-qing.
An urban population flow analysis system based on mobile big data
[J]. Journal of East China Normal University(Natural Sc, 2015, 2015(5): 162-171.
|
[8] |
LI Jun, QIAN Hai-feng, LI Xiang-xue.
Public-key encryption and certificate-based encryption from lattice
[J]. Journal of East China Normal University(Natural Sc, 2014, 2014(1): 47-59.
|
[9] |
HU Zhen-peng;QIAN Hai-feng;LI Zhi-bin .
Multi-receiver identity-based proxy signcryption (Chinese)
[J]. Journal of East China Normal University(Natural Sc, 2008, 2008(1): 83-88.
|
[10] |
WANG Shu-xian;WANG Jing;WANG Neng.
Joint Prevention of Network Intrusion(English)
[J]. Journal of East China Normal University(Natural Sc, 2006, 2006(5): 127-134.
|
[11] |
ZHANG Xun, BAI Wanrong, WEI Feng, WANG Rong, TIAN Xiuxia, LIU Tianshun.
An integrity auditing scheme based on MHT for power equipment images stored in the cloud
[J]. Journal of East China Normal University(Natural Science), 2020, 2020(5): 33-43.
|