共 54 条
- [41] Li Zhaocan, Wang Liming, Ge Sijiang, Et al., Big data plain text watermarking based on orthogonal coding, Computer Science, 46, 12, pp. 148-154, (2019)
- [42] Zhang Jiale, Zhao Yanchao, Chen Bing, Et al., Survey on data security and privacy-preserving for the research of edge computing, Journal on Communications, 39, 3, pp. 1-21, (2018)
- [43] Song Lei, Luo Qiliang, Luo Yi, Et al., Encryption on power systems real-time data communication, Automation of Electric Power Systems, 28, 14, pp. 76-81, (2004)
- [44] (2006)
- [45] Fang Liang, Yin Lihua, Guo Yunchuan, Et al., A survey of key technologies in attribute-based access control scheme, Chinese Journal of Computers, 40, 7, pp. 1680-1698, (2017)
- [46] Wang Baoyi, Qiu Sugai, Zhang Shaomin, A credibility-based access control model in dispatching automation system, Automation of Electric Power Systems, 36, 12, pp. 76-81, (2012)
- [47] Gupta A, Harinarayan V, Rajaraman A., Virtual database technology, Proceedings 14th International Conference on Data Engineering, pp. 297-301, (1998)
- [48] Huo Chengyi, Research on key technologies of cloud computing data privacy protection, Journal of Information Security Research, 5, 12, pp. 1106-1109, (2019)
- [49] (2013)
- [50] Luo Yonglong, Xu Zhiyun, Huang Liusheng, Secure multi-party statistical analysis problems and their applications, Computer Engineering and Applications, 41, 24, pp. 141-143, (2005)