Computer Science ›› 2018, Vol. 45 ›› Issue (7): 150-153.doi: 10.11896/j.issn.1002-137X.2018.07.025
• Information Security • Previous Articles Next Articles
CHEN Gui-ping1,WANG Zi-niu2
CLC Number:
[1]SONG K,WU H J.Cloud storage based on privacy protection and efficient micro-encryption scheme[J].Application of Electronic Technique,2016,42(7):111-113.(in Chinese) 宋可,吴宏建.云存储中基于隐私保护的高效的微型加密方案[J].电子技术应用,2016,42(7):111-113. [2]LEI L,CAI Q W,JING J W,et al.Enforcing Access Controls on Encrypted Cloud Storage with Policy Hiding[J].Journal of Software,2016,27(6):1432-1450.(in Chinese) 雷蕾,蔡权伟,荆继武,等.支持策略隐藏的加密云存储访问控制机制[J].软件学报,2016,27(6):1432-1450. [3]LI J,LI J F,FANG F.Research of File Encryption Storage and Deletion Mechanism in Cloud Storage[J].Journal of Chinese Computer Systems,2015,36(4):836-839.(in Chinese) 李杰,李景峰,房方.云存储中文件加密存储和删除方法研究[J].小型微型计算机系统,2015,36(4):836-839. [4]PAN Q H.A Double Thread Complementary Information En-cryption Algorithm Based on Random Amplitude Modulation[J].Bulletin of Science and Technology,2015,31(12):144-146.(in Chinese) 潘期辉.采用随机码幅度调制的双线程互补信息加密算法[J].科技通报,2015,31(12):144-146. [5]WANG S,LU Y,CHEN L Y.Research of mixed encryption algorithm in cloud storage[J].Electronic Design Engineering,2016,24(23):54-57.(in Chinese) 王双,卢昱,陈立云.云存储中的混合加密算法研究[J].电子设计工程,2016,24(23):54-57. [6]CHENG X X,HAN X Z,CHEN X J,et al.An Optimization Encryption Algorithm for Cloud Storage and Its Simulation[J].Computer Simulation,2016,33(4):356-359.(in Chinese) 程肖肖,韩宪忠,陈雪蛟,等.一种用于云存储的优化加密算法的研究与仿真[J].计算机仿真,2016,33(4):356-359. [7]LU Y,WANG S,CHEN L Y.Research of Mixed Encryption Algorithm Based on Cloud Storage[J].Computer Measurement &Control,2016,24(3):129-132.(in Chinese) 卢昱,王双,陈立云.基于云存储的混合加密算法研究[J].计算机测量与控制,2016,24(3):129-132. [8]HANG T X,DING J Y.A Cloud-storage Privilege RevokingOptimizing Mechanism Based on Dynamic Re-encryption[J].Science Technology and Engineering,2015,15(20):108-115.(in Chinese) 韩同欣,丁建元.基于动态重加密的云计算存储平台权限撤销优化机制[J].科学技术与工程,2015,15(20):108-115. [9]DU Z H,ZHU W Y.Implementation of secure data retrieval schema in cloud storage by using ABE technology[J].Application Research of Computers,2016,33(3):860-865.(in Chinese) 杜朝晖,朱文耀.云存储中利用属性基加密技术的安全数据检索方案[J].计算机应用研究,2016,33(3):860-865. [10]QIU S W,LI Y Y.Reliable data delivery with low delay in energy harvesting wireless sensor network[J].Journal of Computer Applications,2015,35(2):345-350.(in Chinese) 邱树伟,李琰琰.能量捕获无线传感器网络中低时延的可靠数据传递[J].计算机应用,2015,35(2):345-350. [11]HU X D,CAI D Q.Design and research of secure encryptionclustering algorithm for wireless sensor networks.Journal of Chongqing University of Posts and Telecommunications(Natural Science Edition),2009,21(3):421-424.(in Chinese) 胡向东,蔡东强.无线传感器网络安全加密成簇算法的设计及研究.重庆邮电大学学报(自然科学版),2009,21(3):421-424. |
[1] | CHANG Geng, ZHAO Lan, CHEN Wen. MLSTM:A Password Guessing Method Based on Multiple Sequence Length LSTM [J]. Computer Science, 2022, 49(4): 354-361. |
[2] | XIE Zhi-jie, ZHANG Min, LI Zhen-han, WANG Hong-jun. Analysis of Large-scale Real User Password Data Based on Cracking Algorithms [J]. Computer Science, 2020, 47(11): 48-54. |
[3] | ZHANG Jian-an. Users’ Sensitive Information Hiding Method in Hierarchical Heterogeneous Network Based on Mobile Switching Authentication [J]. Computer Science, 2019, 46(3): 217-220. |
[4] | SHE Kan-kan,HU Kong-fa and WANG Zhen. Research and Application on Reduction of Weighted Variable Precision Model Based on Tolerance Theory [J]. Computer Science, 2014, 41(Z11): 351-353. |
[5] | JIN Jing. Research on Optimization of Sorting Algorithm under MapReduce [J]. Computer Science, 2014, 41(12): 155-159. |
[6] | XIE Ming,WU Chan-le. Topic Extracting with User Information Protection on Web [J]. Computer Science, 2011, 38(3): 203-205. |
|