Citation: | XIAO Mingjun, HUANG Liusheng, XU Hongli, WANG Yang, PEI Zegen. Privacy Preserving Hop-distance Computation inWireless Sensor Networks[J]. Chinese Journal of Electronics, 2010, 19(1): 191-194. |
[1] | LI Shundong, ZHANG Mengyu and XU Wenting. Secure Scalar Product Protocols[J]. Chinese Journal of Electronics, 2021, 30(6): 1059-1068. DOI: 10.1049/cje.2021.08.002 |
[2] | SHAN Ruiting, CHEN Xiubo, XU Gang, DOU Zhao, LI Zongpeng, MIAO Lihua, YANG Yixian. Verifiable Multi-Party Universal Blind Quantum Computing in Distributed Networks[J]. Chinese Journal of Electronics, 2021, 30(4): 712-718. DOI: 10.1049/cje.2021.05.013 |
[3] | YANG Changsong, TAO Xiaoling, ZHAO Feng, WANG Yong. Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud Computing[J]. Chinese Journal of Electronics, 2020, 29(2): 273-280. DOI: 10.1049/cje.2020.02.015 |
[4] | SU Mang, LI Fenghua, SHI Guozhen, GENG Kui, XIONG Jinbo. A User-Centric Data Secure Creation Scheme in Cloud Computing[J]. Chinese Journal of Electronics, 2016, 25(4): 753-760. DOI: 10.1049/cje.2016.07.017 |
[5] | HUANG Qinlong, MA Zhaofeng, YANG Yixian, FU Jingyi, NIU Xinxin. EABDS: Attribute-Based Secure Data Sharing with Efficient Revocation in Cloud Computing[J]. Chinese Journal of Electronics, 2015, 24(4): 862-868. DOI: 10.1049/cje.2015.10.033 |
[6] | WANG Kai, LIU Yulin, WAN Qun, JING Xiaojun. Compressed Sensing of IR-UWB Wireless Sensor Network Data Based on Two-Dimensional Measurements[J]. Chinese Journal of Electronics, 2015, 24(3): 627-632. DOI: 10.1049/cje.2015.07.032 |
[7] | WANG Kai, LIU Yulin, WAN Qun, JING Xiaojun. Compressed Sensing of Wireless Sensor Networks Data with Missed Measurements[J]. Chinese Journal of Electronics, 2015, 24(2): 388-392. DOI: 10.1049/cje.2015.04.027 |
[8] | XIAO Mingjun, HUANG Liusheng, XING Kai, LIU An. Opportunistic Data Aggregation in Low-Duty-Cycle Wireless Sensor Networks with Unreliable Links[J]. Chinese Journal of Electronics, 2013, 22(3): 599-603. |
[9] | CHENG Hongbing, RONG Chunming, TAN Zhenghua, ZENG Qingkai. Identity Based Encryption and Biometric Authentication Scheme for Secure Data Access in Cloud Computing[J]. Chinese Journal of Electronics, 2012, 21(2): 254-259. |
[10] | LUO Yonglong, HUANG Liusheng, YANG Wei, XU Weijiang. An Effcient Protocol for Private Comparison Problem[J]. Chinese Journal of Electronics, 2009, 18(2): 205-209. |