Computer Science ›› 2020, Vol. 47 ›› Issue (7): 278-281.doi: 10.11896/jsjkx.190700110
• Information Security • Previous Articles Next Articles
CHEN Li-feng1, ZHU Lu-ping2
CLC Number:
[1]DI H.Research on Data Encryption Based on Cloud Computing Platform[J].Journal of Changchun Normal University,2017,36(3):55-58. [2]MENG Q,MA J F,CHEN K F,et al.A comparison scheme of Internet of things encrypted data based on cloud computing platform[J].Journal of Communications,2018,4:65-70. [3]ZHANG Y.Fuzzy searchable encryption algorithm for privacy information of cloud platform [J].Electronic Technology and Software Engineering,2018(8):214-214. [4]ZHAO T G,DING Y W.Research on cloud storage security cross encryption algorithm [J].Software Guide,2018,17(10):204-208. [5]DENG C Z,LEI Q.Construction and implementation of RSAcloud storage security platform loaded with random oracle model[J].Journal of Huaihua University,2019,38(5):65-69. [6]JI P,LV X M,SU S T,et al.A new sequence preserving encryption algorithm based on coding tree in cloud environment [J].Computer Engineering,2018,44(12):288-293. [7]DU Y Z,DU X H,YANG Z.Information flow control and Implementation Based on attribute encryption in cloud computing environment [J].Computer Engineering,2018(3):27-36. [8]ZHANG H Y.Application of data encryption technology incomputer network communication security [J].Digital Techno-logy and Application,2018(12). [9]LU Y,CHEN Y,LI T,et al.Convolutional Neural Network Construction Method for Embedded FPGAs Oriented Edge Computing.Journal[J].Journal of Computer Research and Development,2018,55(3):551-562. [10]GU L,XU G L,WANG Y R.Dynamic Reconfiguration Theory and Research Development of FPGA[J].Computer Measurement and Control,2007(11):1-4. [11]LIU K,CAI X J,ZHANG Z Y,et al.NVM verification architecture design and verification based on high performance SOC FPGA array[J].Computer Research and Development,2018,55(2):265-272. [12]LU Q S,XU Y S.Design of target recognition and tracking system based on FPGA [J].Modern Electronic Technology,2018(18):3-8. [13]CUI G X.Design of online hardware practice teaching platform based on FPGA[J].Experimental Teaching and Innovation,2017,36(4):153-156. [14]Xilinx Corp.Xilinx FPGAs Configuration User Guide,UG470(v1.13.1)[EB/OL].https://www.xilinx.com/support/documentation/. [15]PANG Y Y,WANG S J,PENG X Y.Research on design method of remote reconfigurable system based on SOPC [J].Journal of Electronic Measurement and Instruments,2010(6):548-554. [16]ZHANG Y,FAN J H,LV Z M,et al.Overview of FPGA dy-namic partial reconfiguration technology [J].Computer and Modernization,2014(3):49-53. [17]XIONG J B,ZHANG Y Y,TIAN Y L,et al.Cloud data security de duplication based on role symmetric encryption[J].Journal of Communications,2018,39(5):59-73. [18]COMPTON K,HAUCK S.Reconfigurable Computing:A Su-rvey of Systems and Software[J].ACM Computing Surveys,2002,2(2):936-938. |
[1] | MAO Dian-hui, HUANG Hui-yu, ZHAO Shuang. Study on Automatic Synthetic News Detection Method Complying with Regulatory Compliance [J]. Computer Science, 2022, 49(6A): 523-530. |
[2] | ZHENG Jia-tong, WU Wen-yuan. Practical Bi-deniable Encryption Scheme Based on MLWE [J]. Computer Science, 2021, 48(3): 307-312. |
[3] | LENG Feng, ZHANG Ming-kai, YAN Zhi-wei, ZHANG Cui-ling, ZENG Yu. Application of Chinese Cryptographic Algorithm in RPKI [J]. Computer Science, 2021, 48(11A): 678-681. |
[4] | XU Kun, FU Yin-jin, CHEN Wei-wei, ZHANG Ya-nan. Research Progress on Blockchain-based Cloud Storage Security Mechanism [J]. Computer Science, 2021, 48(11): 102-115. |
[5] | PANG Xiao-qiong, REN Meng-qi, WANG Tian-qi, CHEN Wen-jun, NIE Meng-fei. Perfect Privacy-preserving Batch Provable Data Possession [J]. Computer Science, 2018, 45(11): 130-137. |
[6] | WANG Chao,LI Zhan-huai,LIU Hai-long and ZHANG Xiao-fang. RM-LCDF:A Recovery Method for Block-level Continuous Data Protection [J]. Computer Science, 2013, 40(6): 172-177. |
[7] | . Improved Data Sharing Scheme over Cloud Storage [J]. Computer Science, 2012, 39(8): 99-103. |
[8] | WU Shi-zhong, XIONG Qi, LIU Hui, LIU Lin, WANG Li-na. Implementation of a File-level Continuous Data Protection System and its Survivability Quantification [J]. Computer Science, 2012, 39(2): 109-114. |
[9] | LIU Lin,XIONG Qi,WU Shi-zhong. Survey of Data Consistency Insurance Technologies for Continuous Data Protection [J]. Computer Science, 2011, 38(Z10): 124-127. |
[10] | HOU Li-man,LI Zhan-hua,HU Na. Neighboring Point Data Recovery for CDP Based on Data Gap [J]. Computer Science, 2011, 38(5): 159-163. |
|