Journal of Computer Applications ›› 2014, Vol. 34 ›› Issue (9): 2635-2638.DOI: 10.11772/j.issn.1001-9081.2014.09.2635
Previous Articles Next Articles
YANG Bo1,2,LI Shundong2
Received:
2014-03-31
Revised:
2014-05-23
Online:
2014-09-30
Published:
2014-09-01
Contact:
YANG Bo
杨波1,2,李顺东1
通讯作者:
杨波
作者简介:
基金资助:
国家自然科学基金面上资助项目
CLC Number:
YANG Bo LI Shundong. New scheme for privacy-preserving in electronic transaction[J]. Journal of Computer Applications, 2014, 34(9): 2635-2638.
杨波 李顺东. 可隐私保护的电子交易新方案[J]. 计算机应用, 2014, 34(9): 2635-2638.
Add to citation manager EndNote|Ris|BibTeX
URL: https://www.joca.cn/EN/10.11772/j.issn.1001-9081.2014.09.2635
[1]WANG J, YU Z, WANG C, et al.A survey on Java program obfuscation techniques [J]. Chinese Journal of Computers, 2011, 1578-1588. (王建民,余志伟,王朝坤,等.Java程序混淆技术综述[J].计算机学报,2011,1578-1588.)
[2]PRAVEEN S, LAL P S. Array data transformation for source code obfuscation [J]. Proceedings of World Academy of Science, Engineering and Technology, 2007, 21(5): 420-424.
[3]PARAMESWARAN R, BLOUGH D M. Privacy preserving data obfuscation for inherently clustered data [J]. International Journal of Information and Computer Security, 2008, 2(1): 4-26.
[4]PARAMESWARAN R. A robust data obfuscation approach for privacy preserving collaborative filtering [D]. Georgia: Georgia Institute of Technology, 2006.
[5]PARAMESWARAN R, BLOUGH D M. Privacy preserving collaborative filtering using data obfuscation [C]// GRC 2007: Proceedings of the 2007 IEEE International Conference on Granular Computing. Piscataway: IEEE, 2007: 380-386.
[6]PARAMESWARAN R, BLOUGH D M. A robust data obfuscation approach for privacy preservation of clustered data [C]// Proceedings of the 2005 IEEE International Conference on Data Mining. Piscataway: IEEE, 2005: 18-25.
[7]BAKKEN D E, PARAMESWARAN R, BLOUGH D M, et al.Data obfuscation: anonymity and desensitization of usable data sets [J]. IEEE Security and Privacy, 2004, 2(6): 34-41.
[8]WU J, CHANG G, GAO F, et al. Study of mobile Agent protection based on data obfuscation and time checking [J]. Journal of Computer Research and Development, 2009, 46(3): 363-369. (吴杰宏,常桂然,高福祥,等.基于数据迷乱和时间核查技术的移动代理保护的研究[J].计算机研究与发展,2009,46(3):363-369.)
[9]FU B, RICHARD G, Ⅲ, CHEN Y. Some new approaches for preventing software tampering [C]// ACM-SE 44: Proceedings of the 44th Annual Southeast Regional Conference. New York: ACM, 2006: 655-660.
[10]XIANG G, YAO Q, ZHU P. Dynamic data hiding based on homomorphism [J]. Journal of Wuhan University of Technology, 2009, 31(23): 96-99. (向广利,姚琴,朱平. 基于同态的动态数据隐藏[J].武汉理工大学学报,2009,31(23):96-99.)
[11]COLLBERG C, THOMBORSON C, LOW D. A taxonomy of obfuscation transformations [R]. Auckland: University of Auckland, 1997.
[12]SOSONKIN M, NAUMOVICH G, MEMON N. Obfuscation of design intent in object-oriented applications [C]// DRM '03: Proceedings of the 3rd ACM Workshop on Digital Rights Management. New York: ACM, 2003: 142-153.
[13]HUANG G, TAN L. Nearest edge data obfuscation algorithm based on DFS [J]. Microelectronics and Computer, 2010, 27(2): 49-54. (黄光球,谭蕾.基于DFS的最优路径数据迷乱算法[J].微电子学与计算机,2010,27(2):49-54.) |
[1] |
SHE Wei, MA Tianxiang, FENG Haige, TIAN Zhao, LIU Wei.
Blockchain covert communication method based on contract call concealment#br#
#br#
[J]. Journal of Computer Applications, 0, (): 0-0.
|
[2] | Rui GAO, Xuebin CHEN, Zucuan ZHANG. Dynamic social network privacy publishing method for partial graph updating [J]. Journal of Computer Applications, 2024, 44(12): 3831-3838. |
[3] | Yong XIANG, Yanjun LI, Dingyun HUANG, Yu CHEN, Huiqin XIE. Differential and linear characteristic analysis of full-round Shadow algorithm [J]. Journal of Computer Applications, 2024, 44(12): 3839-3843. |
[4] | Zhenhao ZHAO, Shibin ZHANG, Wunan WAN, Jinquan ZHANG, zhi QIN. Delegated proof of stake consensus algorithm based on reputation value and strong blind signature algorithm [J]. Journal of Computer Applications, 2024, 44(12): 3717-3722. |
[5] | Yiting WANG, Wunan WAN, Shibin ZHANG, Jinquan ZHANG, Zhi QIN. Linkable ring signature scheme based on SM9 algorithm [J]. Journal of Computer Applications, 2024, 44(12): 3709-3716. |
[6] | Jing LIANG, Wunan WAN, Shibin ZHANG, Jinquan ZHANG, Zhi QIN. Traceability storage model of charity system oriented to master-slave chain [J]. Journal of Computer Applications, 2024, 44(12): 3751-3758. |
[7] | Deyuan LIU, Jingquan ZHANG, Xing ZHANG, Wunan WAN, Shibin ZHANG, Zhi QIN. Cross-chain identity authentication scheme based on certificate-less signcryption [J]. Journal of Computer Applications, 2024, 44(12): 3731-3740. |
[8] | Xin ZHANG, Jinquan ZHANG, Deyuan LIU, Wunan WAN, Shibin ZHANG, Zhi QIN. Cross-chain identity management scheme based on identity-based proxy re-encryption [J]. Journal of Computer Applications, 2024, 44(12): 3723-3730. |
[9] |
DENG Yilin, YU Fajiang.
Pseudo-random number generator based on LSTM and separable self-attention mechanism#br#
#br#
[J]. Journal of Computer Applications, 0, (): 0-0.
|
[10] | . Correlation power analysis of advanced encryption standard algorithm based on uniform manifold approximation and projection [J]. Journal of Computer Applications, 0, (): 0-0. |
[11] | . Dynamic searchable encryption scheme based on puncture pseudorandom function [J]. Journal of Computer Applications, 0, (): 0-0. |
[12] | . fedPF: Federated learning for personalization and fairness [J]. Journal of Computer Applications, 0, (): 0-0. |
[13] | . Review of research on conflict-based cache side-channel attacks and eviction sets [J]. Journal of Computer Applications, 0, (): 0-0. |
[14] | . Secure and efficient frequency estimation method based on shuffled differential privacy [J]. Journal of Computer Applications, 0, (): 0-0. |
[15] | . Blockchain-based model for notarization of simulation testing data in autonomous driving [J]. Journal of Computer Applications, 0, (): 0-0. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||