[1] |
Dayan ZHAO, Huajun HE, Yuping LI, Junbo ZHANG, Tianrui LI, Yu ZHENG.
Access control model for government collaboration
[J]. Journal of Computer Applications, 2025, 45(1): 162-169.
|
[2] |
Sunjie YU, Hui ZENG, Shiyu XIONG, Hongzhou SHI.
Incentive mechanism for federated learning based on generative adversarial network
[J]. Journal of Computer Applications, 2024, 44(2): 344-352.
|
[3] |
Huan ZHANG, Jingyu WANG, Lixin LIU, Xiaoyu JIANG.
Multi-organization collaborative data sharing scheme with dual authorization
[J]. Journal of Computer Applications, 2024, 44(10): 3307-3314.
|
[4] |
Jing ZHANG, He TIAN, Kun XIONG, Yongli TANG, Li YANG.
Fair multi-party private set intersection protocol based on cloud server
[J]. Journal of Computer Applications, 2023, 43(9): 2806-2811.
|
[5] |
Meng CAO, Sunjie YU, Hui ZENG, Hongzhou SHI.
Hierarchical access control and sharing system of medical data based on blockchain
[J]. Journal of Computer Applications, 2023, 43(5): 1518-1526.
|
[6] |
Chao LIN, Debiao HE, Xinyi HUANG.
Blockchain‑based electronic medical record secure sharing
[J]. Journal of Computer Applications, 2022, 42(11): 3465-3472.
|
[7] |
Li LI, Yi WU, Zhikun YANG, Yunpeng CHEN.
Medical electronic record sharing scheme based on sharding-based blockchain
[J]. Journal of Computer Applications, 2022, 42(1): 183-190.
|
[8] |
GE Lina, HU Yugu, ZHANG Guifen, CHEN Yuanyuan.
Reverse hybrid access control scheme based on object attribute matching in cloud computing environment
[J]. Journal of Computer Applications, 2021, 41(6): 1604-1610.
|
[9] |
ZHANG Lihua, WANG Xinyi, HU Fangzhou, HUANG Yang, BAI Jiayi.
Data sharing model of smart grid based on double consortium blockchains
[J]. Journal of Computer Applications, 2021, 41(4): 963-969.
|
[10] |
LUO Wenjun, WEN Shenglian, CHENG Yu.
Blockchain-based electronic health record sharing scheme
[J]. Journal of Computer Applications, 2020, 40(1): 157-161.
|
[11] |
SONG Jundian, DAI Bingrong, JIANG Liwen, ZHAO Yao, LI Chao, WANG Xiaoqiang.
Data governance collaborative method based on blockchain
[J]. Journal of Computer Applications, 2018, 38(9): 2500-2506.
|
[12] |
ZHANG En, JIN Ganggang.
Cloud outsourcing multiparty private set intersection protocol based on homomorphic encryption and Bloom filter
[J]. Journal of Computer Applications, 2018, 38(8): 2256-2260.
|
[13] |
LUO Xiaoshuang, YANG Xiaoyuan, WANG Xu'an.
A private set intersection protocol against malicious attack
[J]. Journal of Computer Applications, 2017, 37(6): 1593-1598.
|
[14] |
CUI Weirong, DU Chenglie.
Fast proximity testing method with privacy preserving in mobile social network
[J]. Journal of Computer Applications, 2017, 37(6): 1657-1662.
|
[15] |
HAO Wei, YANG Xiaoyuan, WANG Xu'an, ZHANG Yingnan, WU Liqiang.
Asymmetric proxy re-encryption scheme of efficient access to outsourcing data for mobile users
[J]. Journal of Computer Applications, 2016, 36(8): 2225-2230.
|