Privacy computing:concept,connotation and its research trend
LI Feng-hua;LI Hui;JIA Yan;YU Neng-hai;WENG Jian;State Key Laboratory of Information Security;Institute of Information Engineering;Chinese Academy of Sciences;School of Cyber Engineering;Xidian University;College of Computer;National University of Defense Technology;School of Information Science and Technology;University of Science and Technology of China;College of Information Science and Technology;Jinan University;
..............page:1-11
Research on the privacy-preserving point-in-polygon protocol
ZHANG Jing;LUO Shou-shan;YANG Yi-xian;XIN Yang;School of Computer and Information Technology;Beijing Jiaotong University;Information Security Center;Beijing University of Posts and Telecommunications;College of Computer Science and Technology;Henan Polytechnic University;
..............page:87-95
..............page:96-106
..............page:107-115
..............page:116-127
..............page:128-138
..............page:139-148
..............page:149-158
..............page:159-171
..............page:172-181
Coupling image denoising model based on total variation
WANG Mei-ling;ZHOU Xian-chun;ZHOU Lin-feng;SHI Lan-fang;School of Electronic and Information Engineering;Nanjing University of Information Science and Technology;Jiangsu Collaborative Innovation Center of Atmospheric Environment and Equipment Technology;Nanjing University of Information Science and Technology;Jiangsu Key Laboratory of Meteorological Observation and Information Processing;Nanjing University of Information Science and Technology;School of Mathematics and Statistics;Nanjing University of Information Science and Technology;
..............page:182-191
..............page:192-198