Acceso abierto

Research on mobile Awareness service and data privacy Protection based on Linear Equations computing protocol


Cite

Yong ge. Design of Several Secure Multi-Party Numerical Computation Basic Protocols [D]. Anhui University,2017. Search in Google Scholar

Li wang, Qingwen wang. Computational protocol for general linear equations protecting private information [J]. Journal of applied mathematics and computational mathematics,2014,28(03):300-307. Search in Google Scholar

Li chen. Research on the application of secure multi-party computing in Internet of Things [D]. Fuzhou University,2014. Search in Google Scholar

Li chen, Baigang lin. Secure Multi-Party Computing Protocol Based on Distributed Linear Equations [J]. Information Network Security,2013(09):2-5. Search in Google Scholar

Li wang. Design and Analysis of several matrix cryptographic protocols [D]. Shanghai University,2013. (in Chinese) Search in Google Scholar

Yang yang. Simple secure multi-party computing protocol [J]. Silicon Valley,2011(10):161+163. Search in Google Scholar

Hengyue jia, Huanping liu. Computer Engineering and Applications,2008(33):112-114. Search in Google Scholar

Zhifang zhang. Multiplicative monotone Stretching scheme [J]. Journal of Graduate School of Chinese Academy of Sciences,2006(06):827-832. Search in Google Scholar

Wenjun luo, Xiang li. Multi-secure Matrix Product Protocol and Its Application [J]. Chinese Journal of Computers,2005(07):1230-1235. Search in Google Scholar

[Hua zhang. Research on Secure Multi-party Computing and its Application [D]. Xidian University,2005. Search in Google Scholar

eISSN:
2444-8656
Idioma:
Inglés
Calendario de la edición:
Volume Open
Temas de la revista:
Life Sciences, other, Mathematics, Applied Mathematics, General Mathematics, Physics