| [1] |
JI Xiulan.
User Device Security Authentication Method for Cloud Computing Data Transmission
[J]. Computer and Modernization, 2025, 0(09): 55-60.
|
| [2] |
CHENG Yuwen, JING Yijun, SHI Zicheng, JING Changqiang, GUO Feng, WU Chuankun.
A Data Privacy Protection Scheme Based on Federated Learning
[J]. Computer and Modernization, 2025, 0(08): 63-69.
|
| [3] |
XUE Wenxue, XIE Yingde.
Privacy-preservation Models for Identifying Financial Fraud in Enterprises
[J]. Computer and Modernization, 2025, 0(06): 16-20.
|
| [4] |
ZHA Kai-jin, WANG Zhi-bo, HE Yue-shun, XU Hong-zhen.
Survey on Blockchain Security Protection
[J]. Computer and Modernization, 2023, 0(06): 110-117.
|
| [5] |
FENG Li-gang, ZHU You-wen, .
Utility-optimized Local Differential Privacy Mechanism for Protecting Location Privacy
[J]. Computer and Modernization, 2022, 0(09): 99-105.
|
| [6] |
ZHANG Tian-xi, WANG Li-peng, ZHOU Chun-tian, YANG Yan-yan, LI Xiao-chong.
Secret Content Auditing Scheme in Internet of Things Scenes Based on Blockchain
[J]. Computer and Modernization, 2022, 0(03): 30-36.
|
| [7] |
ZUO Peng, HE Zhi-mou, YUAN Meng, ZHANG Hai-kuo, YANG Wei-ping.
Identifier Resolution Model Based on Encryption Transmission
[J]. Computer and Modernization, 2020, 0(04): 46-.
|
| [8] |
SHANG Jing-wei1,2, JIANG Rong1,2, HU Xiao-han1,2, SHI Ming-yue1,2.
Medical Big Data and Privacy Leakage
[J]. Computer and Modernization, 2019, 0(07): 111-.
|
| [9] |
YAN Long-ji, XIAO Wei, CHEN Peng.
Sinusoidal Signal Frequency Estimation Method Based on Delay Cross-correlation
[J]. Computer and Modernization, 2018, 0(09): 118-.
|
| [10] |
LIU Bo, HUANG Zhi-qiu, WANG Shan-shan.
A Method of Service Evolution for Controlling Risk of Privacy Exposure
[J]. Computer and Modernization, 2014, 0(10): 76-80,107.
|
| [11] |
ZHANG Xing-lan;YU Jin-ying.
Strategy for Privacy Protection of Supporting Data Modification
[J]. Computer and Modernization, 2013, 1(8): 175-178,.
|
| [12] |
XU Shuai.
Research on Enforcing Privacy Security in MapReduce Based on Decentralized Information Flow Control
[J]. Computer and Modernization, 2012, 1(03): 93-97.
|
| [13] |
RAO Lan-xiang.
Research on Data Mining Based on Privacy Protection
[J]. Computer and Modernization, 2011, 12(12): 109-111.
|