Otwarty dostęp

Research on mobile Awareness service and data privacy Protection based on Linear Equations computing protocol

 oraz   
15 lip 2022

Zacytuj
Pobierz okładkę

Yong ge. Design of Several Secure Multi-Party Numerical Computation Basic Protocols [D]. Anhui University,2017. Search in Google Scholar

Li wang, Qingwen wang. Computational protocol for general linear equations protecting private information [J]. Journal of applied mathematics and computational mathematics,2014,28(03):300-307. Search in Google Scholar

Li chen. Research on the application of secure multi-party computing in Internet of Things [D]. Fuzhou University,2014. Search in Google Scholar

Li chen, Baigang lin. Secure Multi-Party Computing Protocol Based on Distributed Linear Equations [J]. Information Network Security,2013(09):2-5. Search in Google Scholar

Li wang. Design and Analysis of several matrix cryptographic protocols [D]. Shanghai University,2013. (in Chinese) Search in Google Scholar

Yang yang. Simple secure multi-party computing protocol [J]. Silicon Valley,2011(10):161+163. Search in Google Scholar

Hengyue jia, Huanping liu. Computer Engineering and Applications,2008(33):112-114. Search in Google Scholar

Zhifang zhang. Multiplicative monotone Stretching scheme [J]. Journal of Graduate School of Chinese Academy of Sciences,2006(06):827-832. Search in Google Scholar

Wenjun luo, Xiang li. Multi-secure Matrix Product Protocol and Its Application [J]. Chinese Journal of Computers,2005(07):1230-1235. Search in Google Scholar

[Hua zhang. Research on Secure Multi-party Computing and its Application [D]. Xidian University,2005. Search in Google Scholar

Język:
Angielski
Częstotliwość wydawania:
1 razy w roku
Dziedziny czasopisma:
Nauki biologiczne, Nauki biologiczne, inne, Matematyka, Matematyka stosowana, Matematyka ogólna, Fizyka, Fizyka, inne