Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Harden Tamper-Proofing to Combat MATE Attack

    The malicious modification on software is a major threat on software copyright. As a common protection method, tamper-proofing can detect and respond the malicious modification. However, existing works conside...

    Zhe Chen, Chunfu Jia, Tongtong Lv, Tong Li in Algorithms and Architectures for Parallel … (2018)

  2. No Access

    Chapter and Conference Paper

    K-Anonymity Algorithm Based on Improved Clustering

    K-anonymity is the most widely used technology in the field of privacy preservation. It has a good performance particularly in protecting data privacy in the scenarios of data publication, location-based servic.....

    Wantong Zheng, Zhongyue Wang, Tongtong Lv in Algorithms and Architectures for Parallel … (2018)