[1] |
YANG Peng WU Qiming .
Attribute-Aware Task Allocation and Privacy-Preserving Coordination Mechanism for MCS
[J]. Journal of South China University of Technology (Natural Science Edition), 2020, 48(8): 38-48.
|
[2] |
MEI Yuan YE Dengpan LIU Changrui .
Review of Image Retrieval Technologies in Encrypted Domain
[J]. Journal of South China University of Technology (Natural Science Edition), 2018, 46(5): 78-86.
|
[3] |
WU Haotian TANG Hongxiang WANG Jianming.
A Reversible Visual Transformation Algorithm for JPEG Images
[J]. Journal of South China University of Technology (Natural Science Edition), 2018, 46(5): 16-21.
|
[4] |
WANG Hui-yong FENG Yong ZHAO Ling-zhong TANG Shi-jie.
A Secure Multi-Party Computation Protocol on the Basis of Multi-Key Homomorphism
[J]. Journal of South China University of Technology (Natural Science Edition), 2017, 45(7): 69-76.
|
[5] |
WANG Zhi-dong WANG Gang XU Zhi-heng TONG Jin-fang SHI Quan ZHU Ge-lan.
Encryption and Decryption Methods of GOOSE Packets Based on Domain Implication
[J]. Journal of South China University of Technology (Natural Science Edition), 2016, 44(4): 63-70.
|
[6] |
Zheng Yu-lin Cai Yi.
Cryptanalysis of an IB-PRE Scheme with Source Hiding Property
[J]. Journal of South China University of Technology (Natural Science Edition), 2015, 43(1): 118-125.
|
[7] |
Luo Yu- ling Du Ming- hui.
Image Encryption Algorithm Based on Quantum Logistic Map in Wavelet Domain
[J]. Journal of South China University of Technology (Natural Science Edition), 2013, 41(6): 53-62.
|
[8] |
Jin Jian-xiu Zheng Yi-feng Li Xu-qiong.
Evaluation of Image Scrambling Degree Based on Block Information Entropy Variance
[J]. Journal of South China University of Technology (Natural Science Edition), 2013, 41(3): 8-14.
|
[9] |
Deng Yu-qiao Du Ming-hui Liang Ya-ling Liao Bing.
Error-Correcting Digital Signature Scheme Based on Knapsack Problem
[J]. Journal of South China University of Technology (Natural Science Edition), 2010, 38(6): 46-49.
|
[10] |
Zhang Guo-ji Xiao Huang-pei.
Quadratic Equations on S-Boxes and a New S-Box Design Criterion
[J]. Journal of South China University of Technology (Natural Science Edition), 2008, 36(8): 140-144.
|
[11] |
Xiao Huang-pei Zhang Guo-ji Huang Ying-ying.
Interpolation Attack Method of Round-Reduced AES
[J]. Journal of South China University of Technology (Natural Science Edition), 2008, 36(5): 53-57,64.
|
[12] |
Xiang Fei Xiao Hui-juan Qiu Shui-sheng.
Design Scheme of Secure Communication System for Image Based on CNN and DES
[J]. Journal of South China University of Technology (Natural Science Edition), 2007, 35(9): 31-35.
|
[13] |
Liu lin-mei Qiu Shui-sheng Xiang Fei Xiao Hui-juan.
Information Encryption Algorithm Based on Multiple Chaotic Mappings
[J]. Journal of South China University of Technology (Natural Science Edition), 2007, 35(5): 1-5.
|
[14] |
Gong Zhu-ping Sun Yan-ming Zheng Shi-xiong.
Order-Disorder Measurement Theory of Manufacturing Information System
[J]. Journal of South China University of Technology (Natural Science Edition), 2007, 35(12): 45-50.
|
[15] |
Liu Yi Zhang Ling.
Securely Alternative Route Protocol ßased on Mobile Agents
[J]. Journal of South China University of Technology (Natural Science Edition), 2007, 35(1): 84-88.
|