Volume 29,Issue 7,2018 Table of Contents
面向隐私保护的新型技术与密码算法专题前言薛锐,彭长根,黄欣沂,刘吉强,禹勇2018,29(7):1827-1829 [Abstract(3490)] [View PDF(4037)407.22 K]Survey on Homomorphic Encryption Algorithm and Its Application in the Privacy-Preserving for Cloud ComputingLI Zong-Yu, GUI Xiao-Lin, GU Ying-Jie, LI Xue-Song, DAI Hui-Jun and ZHANG Xue-Jun2018,29(7):1830-1851 [Abstract(8512)] [View PDF(12474)2.36 M]Distribution-Perceptive-Based Spatial Cloaking Algorithm for Location Privacy in Mobile Peer-to-Peer EnviromentsXU Ming-Yan, ZHAO Hua, JI Xin-Sheng and SHEN Juan2018,29(7):1852-1862 [Abstract(4781)] [View PDF(4497)1.26 M]Leakage Perception Method for Backdoor Privacy in Industry Internet of Things EnvironmentSHA Le-Tian, XIAO Fu, CHEN Wei, SUN Jing and WANG Ru-Chuan2018,29(7):1863-1879 [Abstract(5320)] [View PDF(5702)1.85 M]Novel Construction of Identity-Based Hash Proof System Based on LatticesLAI Qi-Qi, YANG Bo, CHEN Yuan, HAN Lu-Lu and BAI Jian2018,29(7):1880-1892 [Abstract(4580)] [View PDF(5514)1.45 M]String Sorting Based Efficient Secure Database QueryLI Shun-Dong, KANG Jia, YANG Xiao-Yi and DOU Jia-Wei2018,29(7):1893-1908 [Abstract(4398)] [View PDF(4429)1.71 M]Secure Encrypted Data Deduplication Method Based on Offline Key DistributionZHANG Shu-Guang, XIAN He-Qun, WANG Ya-Zhe, LIU Hong-Yan and HOU Rui-Tao2018,29(7):1909-1921 [Abstract(4653)] [View PDF(4968)1.50 M]RFID Air Interface Intrusion Detection Technology Based on Malicious Reader DiscoveryHUANG Wei-Qing, DING Chang, CUI Yue, WANG Si-Ye, ZHANG Yan-Fang, ZHAO Bo-Bai, ZHU Shao-Yi, MAO Rui and CHEN Chao2018,29(7):1922-1936 [Abstract(4297)] [View PDF(5053)1.88 M]Crytanalysis of Three Anonymous Authentication Schemes for Multi-Server EnvironmentWANG Ding, LI Wen-Ting and WANG Ping2018,29(7):1937-1952 [Abstract(4578)] [View PDF(5213)1.66 M]Fair and Rational Delegation Computation ProtocolYIN Xin, TIAN You-Liang and WANG Hai-Long2018,29(7):1953-1962 [Abstract(4497)] [View PDF(5062)1.18 M]Research Progress on Privacy Measurement for Cloud DataXIONG Jin-Bo, WANG Min-Shen, TIAN You-Liang, MA Rong, YAO Zhi-Qiang and LIN Ming-Wei2018,29(7):1963-1980 [Abstract(6184)] [View PDF(6795)1.93 M]Survey on Local Differential PrivacyYE Qing-Qing, MENG Xiao-Feng, ZHU Min-Jie and HUO Zheng2018,29(7):1981-2005 [Abstract(8124)] [View PDF(15091)2.61 M]Efficient and Verifiable Muti-Authority Attribute Based Encryption SchemeZHONG Hong, CUI Jie, ZHU Wen-Long and XU Yan2018,29(7):2006-2017 [Abstract(4690)] [View PDF(5429)1.34 M]
Semantic Understanding of Spatio-Temporal Data: Technology & ApplicationYAO Di, ZHANG Chao, HUANG Jian-Hui, CHEN Yue-Xin and BI Jing-Ping2018,29(7):2018-2045 [Abstract(4549)] [View PDF(8969)2.71 M]Features Oriented Survey of State-of-the-Art Keyphrase Extraction AlgorithmsCHANG Yao-Cheng, ZHANG Yu-Xiang, WANG Hong, WAN Huai-Yu and XIAO Chun-Jing2018,29(7):2046-2070 [Abstract(5158)] [View PDF(8300)2.53 M]Survey of Unstable Gradients in Deep Neural Network TrainingCHEN Jian-Ting and XIANG Yang2018,29(7):2071-2091 [Abstract(4148)] [View PDF(6852)2.10 M]Research Progress of Blockchain Technology and Its Application in Information SecurityLIU Ao-Di, DU Xue-Hui, WANG Na and LI Shao-Zhuo2018,29(7):2092-2115 [Abstract(10028)] [View PDF(17837)2.52 M]Survey of Geo-Distributed Cloud Research ProgressZHANG Xiao-Li, YANG Jia-Hai, SUN Xiao-Qing and WU Jian-Ping2018,29(7):2116-2132 [Abstract(5006)] [View PDF(7664)1.80 M]Review of the Effect of Computed Tomography Projection Sampling Strategy on Reconstruction QualityYANG Fu-Qiang, ZHANG Ding-Hua, HUANG Kui-Dong, GAO Zong-Zhao and LIAO Jin-Ming2018,29(7):2133-2151 [Abstract(3351)] [View PDF(5103)2.40 M]State-of-the-Art Survey of Real-Time Multicore SystemCHEN Gang, GUAN Nan, LÜ Ming-Song and WANG Yi2018,29(7):2152-2176 [Abstract(4776)] [View PDF(7483)2.40 M]