Journal of Computer Applications ›› 2014, Vol. 34 ›› Issue (7): 1922-1928.DOI: 10.11772/j.issn.1001-9081.2014.07.1922
Previous Articles Next Articles
HUANG Weiwen1,LUO Jia2
Received:
2014-01-20
Revised:
2014-03-06
Online:
2014-08-01
Published:
2014-07-01
Contact:
HUANG Weiwen
黄伟文1,罗佳2
通讯作者:
黄伟文
作者简介:
基金资助:
国家自然科学基金面上项目
CLC Number:
HUANG Weiwen LUO Jia. Data-leakage detection scheme based on fingerprint and Bloom filters[J]. Journal of Computer Applications, 2014, 34(7): 1922-1928.
黄伟文 罗佳. 基于指纹和Bloom滤波器的数据泄漏检测方案[J]. 计算机应用, 2014, 34(7): 1922-1928.
Add to citation manager EndNote|Ris|BibTeX
URL: https://www.joca.cn/EN/10.11772/j.issn.1001-9081.2014.07.1922
[1]LIN C, SU W, MENG K,et al. Cloud computing security: architecture, mechanism and modeling[J].Chinese Journal of Computers, 2013, 36(9): 1765-1784.(林闯, 苏文博, 孟坤, 等. 云计算安全: 架构, 机制与模型评价[J]. 计算机学报, 2013, 36(9):1765-1784.) |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||