吉林大学学报(工学版) ›› 2012, Vol. 42 ›› Issue (增刊1): 295-299.
Previous Articles Next Articles
CHEN Long1,2, LI Jun-zhong1
CLC Number:
| [1] 冯登国,张敏,张妍,等.云计算安全研究[J].软件学报,2011,22(1): 71-83. Feng Deng-guo,Zhang Min,Zhang Yan,et al.Study on cloud computing security[J].Journal of Software,2011,22(1): 71-83.[2] 陈龙,王国胤.有限域上高效的细粒度数据完整性检验方法[J].计算机学报,2011,34(5): 847-855. Chen Long,Wang Guo-yin.An efficient integrity check method for fine-grained data over galois field[J].Chinese Journal of Computers,2011,34(5): 847-855.[3] Ari Juels,Burton S Kaliski.PORs: Proofs of retrievability for large files[C]//in Proc.of CCS'07.New York,NY,USA: ACM,2007:584–597.[4] Wang Qian,Wang Cong,Ren Kui,et al.Enabling public auditability and data dynamics for storage security in cloud computing[J].IEEE Transactions on Parallel and Distributed Systems,2011,22(5): 847-859.[5] Shacham H,Waters B.Compact proofs of retrieva-bility[J].Advances in Cryptology Asiacrypt,2008,LNCS 5350:90-107.[6] Wang Cong,Wang Qian,Ren Kui,et al.Privacy-preserving public auditing for data storage security in cloud computing[C]//InfoCom2010,IEEE,2010.[7] Chris Erway C,Alptekin Küpçü,Charalampos Papamanthou,et al.Dynamic provable data possession[C]//Proc of CCS'09.Chicago,IL: ACM,2009: 213-222.[8] Merkle R C.Protocols for public key cryptosyste-ms[C]//Proc of IEEE Symposium on Security and Privacy'80,1980:122-133.[9] Boneh D,Lynn B,Shacham H.Short signatures from the weil Pairing[C]//Proc of Cryptology Asiacrypt'2001.London,UK: Springer-Verlag,2001: 514-532. |
| [1] | LIU Fu,ZONG Yu-xuan,KANG Bing,ZHANG Yi-meng,LIN Cai-xia,ZHAO Hong-wei. Dorsal hand vein recognition system based on optimized texture features [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1844-1850. |
| [2] | WANG Li-min,LIU Yang,SUN Ming-hui,LI Mei-hui. Ensemble of unrestricted K-dependence Bayesian classifiers based on Markov blanket [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1851-1858. |
| [3] | JIN Shun-fu,WANG Bao-shuai,HAO Shan-shan,JIA Xiao-guang,HUO Zhan-qiang. Synchronous sleeping based energy saving strategy of reservation virtual machines in cloud data centers and its performance research [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1859-1866. |
| [4] | ZHAO Dong,SUN Ming-yu,ZHU Jin-long,YU Fan-hua,LIU Guang-jie,CHEN Hui-ling. Improved moth-flame optimization method based on combination of particle swarm optimization and simplex method [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1867-1872. |
| [5] | LIU En-ze,WU Wen-fu. Agricultural surface multiple feature decision fusion disease judgment algorithm based on machine vision [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1873-1878. |
| [6] | OUYANG Dan-tong, FAN Qi. Clause-level context-aware open information extraction [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1563-1570. |
| [7] | LIU Fu, LAN Xu-teng, HOU Tao, KANG Bing, LIU Yun, LIN Cai-xia. Metagenomic clustering method based on k-mer frequency optimization [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1593-1599. |
| [8] | GUI Chun, HUANG Wang-xing. Network clustering method based on improved label propagation algorithm [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1600-1605. |
| [9] | LIU Yuan-ning, LIU Shuai, ZHU Xiao-dong, CHEN Yi-hao, ZHENG Shao-ge, SHEN Chun-zhuang. LOG operator and adaptive optimization Gabor filtering for iris recognition [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1606-1613. |
| [10] | CHE Xiang-jiu, WANG Li, GUO Xiao-xin. Improved boundary detection based on multi-scale cues fusion [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1621-1628. |
| [11] | ZHAO Hong-wei, LIU Yu-qi, DONG Li-yan, WANG Yu, LIU Pei. Dynamic route optimization algorithm based on hybrid in ITS [J]. 吉林大学学报(工学版), 2018, 48(4): 1214-1223. |
| [12] | HUANG Hui, FENG Xi-an, WEI Yan, XU Chi, CHEN Hui-ling. An intelligent system based on enhanced kernel extreme learning machine for choosing the second major [J]. 吉林大学学报(工学版), 2018, 48(4): 1224-1230. |
| [13] | FU Wen-bo, ZHANG Jie, CHEN Yong-le. Network topology discovery algorithm against routing spoofing attack in Internet of things [J]. 吉林大学学报(工学版), 2018, 48(4): 1231-1236. |
| [14] | CAO Jie, SU Zhe, LI Xiao-xu. Image annotation method based on Corr-LDA model [J]. 吉林大学学报(工学版), 2018, 48(4): 1237-1243. |
| [15] | HOU Yong-hong, WANG Li-wei, XING Jia-ming. HTTP-based dynamic adaptive streaming video transmission algorithm [J]. 吉林大学学报(工学版), 2018, 48(4): 1244-1253. |
|
||