nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Aggregation Tree Statistical Computing Based on Functional Encryption
|
Xiang, Guangli |
|
2019 |
24 |
2 |
p. 116-124 |
artikel |
2 |
A Method for Software Vulnerability Detection Based on Improved Control Flow Graph
|
Zhou, Minmin |
|
2019 |
24 |
2 |
p. 149-160 |
artikel |
3 |
A Method for Time-Series Location Data Publication Based on Differential Privacy
|
Kang, Haiyan |
|
2019 |
24 |
2 |
p. 107-115 |
artikel |
4 |
An Association Ring Signature for Block Chain E-Money Transactions
|
Yang, Kai |
|
2019 |
24 |
2 |
p. 169-175 |
artikel |
5 |
An Inner Product Encryption Scheme Based on Dual Systems
|
Wei, Duo |
|
2019 |
24 |
2 |
p. 125-133 |
artikel |
6 |
A Python Security Analysis Framework in Integrity Verification and Vulnerability Detection
|
Peng, Shuanghe |
|
2019 |
24 |
2 |
p. 141-148 |
artikel |
7 |
Differentially Private Top-k Items Based on Least Mean Square——Take E-Commerce Platforms for Example
|
Cao, Mengyue |
|
2019 |
24 |
2 |
p. 98-106 |
artikel |
8 |
Learning Multi Labels from Single Label —— An Extreme Weak Label Learning Algorithm
|
Duan, Junhong |
|
2019 |
24 |
2 |
p. 161-168 |
artikel |
9 |
New AES Dual Ciphers Based on Rotation of Columns
|
Yang, Min |
|
2019 |
24 |
2 |
p. 93-97 |
artikel |
10 |
Scheme on Cross-Domain Identity Authentication Based on Group Signature for Cloud Computing
|
Yang, Yanyan |
|
2019 |
24 |
2 |
p. 134-140 |
artikel |
11 |
Simultaneous Localization and Mapping Technology Based on Project Tango
|
Xu, Pei |
|
2019 |
24 |
2 |
p. 176-184 |
artikel |