Computer Science ›› 2020, Vol. 47 ›› Issue (6A): 634-638.doi: 10.11896/JsJkx.190600075
• Interdiscipline & Application • Previous Articles Next Articles
REN Yi
CLC Number:
[1] SUN J G.Prospects for the development of blockchain technology .China Finance,2016,262(8):23-24. [2] LI M,TANG Y.Design and Implementation of Distributed Web Search Model Based on Mobile Agent.Computer Applications and Software,2016,33(4):18-21. [3] LI X G,SHEN Y L,KANG X Q.Hyper-chaotic two-way authentication private information security encryption algorithm .Science bulletin,2017,33(8):152-155. [4] ZHANG X W,LI H K,YANG Y T,et al.Personal information privacy protection logistics system based on two-dimensional code technology.Computer Applications Research,2016,33(11):3455-3459. [5] CHEN W X,ZHANG T J,LIN J Q,et al.Mobile Agent Based Opportunity Opportunity Transmission Control Method.Journal of Jiangsu University(Natural Science Edition),2018,39(3):66-72. [6] GUO S N,JIANG X Q.Design of Information Encryption and Decryption System for Emergency Communication Network.Modern Electronic Technology,2017,40(17):94-97. [7] WANG Z D,WANG G,LI Y C,et al.IEC 61850-9-2LE message encryption method based on micro-encryption algorithm.Power System Automation,2016,18(4):121-127. [8] ZHANG B,WANG H.A dynamic packet encryption scheme based on mobile communication device authentication .Electronic Design Engineering,2018,26(22):68-71. [9] MA W W.Esearch on Security Encryption of Information Col-lection under Mobile Internet.Electronic Design Enginee-ring,2018,26(23):52-56. [10] JIANG D D,SHANG Y L,TIAN Y,et al.Construction of electronic warehouse single flow platform based on blockchain.Journal of Xi’an Engineering University,2017,31(6):828-834. [11] CAI K.Magos AI proJect brings artificial intelligence and neural network technology to the blockchain field .Computer & Network,2017,43(18):77. [12] ZHOU R M,ZHANG W X.Analysis on Risks and Control of Financial Technology Innovation-Based on Big Data,Artificial Intelligence and Blockchain Research.China Management Information Technology,2017(19):33-36. [13] PAN J F,HUANG D C.Influence of Blockchain Technology on Artificial Intelligence.Computer Science,2018,45(S2):53-57. [14] XIE W.GMIC Global Financial Innovation Summit:When Big Data,Artificial Intelligence,Blockchain Technology Meets Finance .China Economic Weekly,2016(18):50-51. [15] PENG J J,LONG R L.Research on Key Technologies of Security Protection in Blockchain Application Environment.Network Security Technology and Application,2018,210(6):29-36. [16] YANG M J.Design of Data Transaction Platform Based on Password and Blockchain Technology.Information and Communication Technology,2016(4):24-31. [17] TIAN H B,HE J J,FU L Q.Privacy Protection Fair Contract Signing Agreement Based on Public Blockchain.Journal of Cryptography,2017,4(2):97-108. [18] CHEN T,MA M,XU X L.Application Research of Blockchain in Information Sharing and Use of Smart City.E-Government,2018,187(7):36-45. [19] ZHOU J.Application of Mobile Agent Technology in Enterprise Network Management.Network Security Technology and Application,2017(6):155-156. [20] YE X R,SHAO Q,XIAO R.Supply Chain Prototype System Based on Blockchain,Smart Contract and Internet of Things Based on Blockchain.Science & Technology Review,2017,35(23):62-69. |
[1] | LYU You, WU Wen-yuan. Privacy-preserving Linear Regression Scheme and Its Application [J]. Computer Science, 2022, 49(9): 318-325. |
[2] | WANG Lei, LI Xiao-yu. LBS Mobile Privacy Protection Scheme Based on Random Onion Routing [J]. Computer Science, 2022, 49(9): 347-354. |
[3] | ZHOU Lian-bing, ZHOU Xiang-zhen, CUI Xue-rong. Compressed Image Encryption Scheme Based on Dual Two Dimensional Chaotic Map [J]. Computer Science, 2022, 49(8): 344-349. |
[4] | LI Li, HE Xin, HAN Zhi-jie. Review of Privacy-preserving Mechanisms in Crowdsensing [J]. Computer Science, 2022, 49(5): 303-310. |
[5] | QIN Xiao-yue, HUANG Ru-wei, YANG Bo. NTRU Type Fully Homomorphic Encryption Scheme over Prime Power Cyclotomic Rings [J]. Computer Science, 2022, 49(5): 341-346. |
[6] | LI Ye, CHEN Song-can. Physics-informed Neural Networks:Recent Advances and Prospects [J]. Computer Science, 2022, 49(4): 254-262. |
[7] | SONG Tao, LI Xiu-hua, LI Hui, WEN Jun-hao, XIONG Qing-yu, CHEN Jie. Overview of Research on Security Encryption Authentication Technology of IoV in Big Data Era [J]. Computer Science, 2022, 49(4): 340-353. |
[8] | REN Hua, NIU Shao-zhang, WANG Mao-sen, YUE Zhen, REN Ru-yong. Homomorphic and Commutative Fragile Zero-watermarking Based on SVD [J]. Computer Science, 2022, 49(3): 70-76. |
[9] | GAO Shi-yao, CHEN Yan-li, XU Yu-lan. Expressive Attribute-based Searchable Encryption Scheme in Cloud Computing [J]. Computer Science, 2022, 49(3): 313-321. |
[10] | LYU You, WU Wen-yuan. Linear System Solving Scheme Based on Homomorphic Encryption [J]. Computer Science, 2022, 49(3): 338-345. |
[11] | JIN Hua, ZHU Jing-yu, WANG Chang-da. Review on Video Privacy Protection [J]. Computer Science, 2022, 49(1): 306-313. |
[12] | LIANG Jian, HE Jun-hui. H.264/AVC Video Encryption Based on Adaptive Permutation of Macroblock Coding Information [J]. Computer Science, 2022, 49(1): 314-320. |
[13] | ZHANG Sai-nan, LI Qian-mu. Color Image Encryption Algorithm Based on Logistic-Sine-Cosine Mapping [J]. Computer Science, 2022, 49(1): 353-358. |
[14] | CHAO Le-men, YIN Xian-long. AI Governance and System:Current Situation and Trend [J]. Computer Science, 2021, 48(9): 1-8. |
[15] | ZHANG Xiao-yan, LI Qin-wei, FU Fu-jie. Secret Verification Method of Blockchain Transaction Amount Based on Digital Commitment [J]. Computer Science, 2021, 48(9): 324-329. |
|