1. bookVolume 8 (2023): Issue 1 (January 2023)
Journal Details
License
Format
Journal
eISSN
2444-8656
First Published
01 Jan 2016
Publication timeframe
2 times per year
Languages
English
Open Access

Research on mobile Awareness service and data privacy Protection based on Linear Equations computing protocol

Published Online: 15 Jul 2022
Volume & Issue: Volume 8 (2023) - Issue 1 (January 2023)
Page range: 1369 - 1376
Received: 09 Mar 2022
Accepted: 14 May 2022
Journal Details
License
Format
Journal
eISSN
2444-8656
First Published
01 Jan 2016
Publication timeframe
2 times per year
Languages
English

FIG. 1

Structure diagram of mobile awareness service model
Structure diagram of mobile awareness service model

Figure 2

Data privacy protection structure of mobile awareness service
Data privacy protection structure of mobile awareness service

FIG. 3

Algorithm schematic diagram
Algorithm schematic diagram

FIG. 4

Algorithm flow chart of symmetric encryption
Algorithm flow chart of symmetric encryption

FIG. 5

Model structure diagram of network representation learning algorithm
Model structure diagram of network representation learning algorithm

Yong ge. Design of Several Secure Multi-Party Numerical Computation Basic Protocols [D]. Anhui University,2017. Search in Google Scholar

Li wang, Qingwen wang. Computational protocol for general linear equations protecting private information [J]. Journal of applied mathematics and computational mathematics,2014,28(03):300-307. Search in Google Scholar

Li chen. Research on the application of secure multi-party computing in Internet of Things [D]. Fuzhou University,2014. Search in Google Scholar

Li chen, Baigang lin. Secure Multi-Party Computing Protocol Based on Distributed Linear Equations [J]. Information Network Security,2013(09):2-5. Search in Google Scholar

Li wang. Design and Analysis of several matrix cryptographic protocols [D]. Shanghai University,2013. (in Chinese) Search in Google Scholar

Yang yang. Simple secure multi-party computing protocol [J]. Silicon Valley,2011(10):161+163. Search in Google Scholar

Hengyue jia, Huanping liu. Computer Engineering and Applications,2008(33):112-114. Search in Google Scholar

Zhifang zhang. Multiplicative monotone Stretching scheme [J]. Journal of Graduate School of Chinese Academy of Sciences,2006(06):827-832. Search in Google Scholar

Wenjun luo, Xiang li. Multi-secure Matrix Product Protocol and Its Application [J]. Chinese Journal of Computers,2005(07):1230-1235. Search in Google Scholar

[Hua zhang. Research on Secure Multi-party Computing and its Application [D]. Xidian University,2005. Search in Google Scholar

Recommended articles from Trend MD