期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Bi-extrapolated subgradient projection algorithm for solving multiple-sets split feasibility problem 被引量:2
1
作者 DANG Ya-zheng GAO Yan 《Applied Mathematics(A Journal of Chinese Universities)》 SCIE CSCD 2014年第3期283-294,共12页
This paper deals with a bi-extrapolated subgradient projection algorithm by intro- ducing two extrapolated factors in the iterative step to solve the multiple-sets split feasibility problem. The strategy is intend to ... This paper deals with a bi-extrapolated subgradient projection algorithm by intro- ducing two extrapolated factors in the iterative step to solve the multiple-sets split feasibility problem. The strategy is intend to improve the convergence. And its convergence is proved un- der some suitable conditions. Numerical results illustrate that the bi-extrapolated subgradient projection algorithm converges more quickly than the existing algorithms. 展开更多
关键词 Multiple-sets split feasibility problem SUBGRADIENT accelerated iterative algorithm convergence.
下载PDF
Research on k-anonymity privacy protection scheme based on bilinear pairings 被引量:1
2
作者 Song Cheng Zhang Yadong +1 位作者 Wang Lei Liu Zhizhong 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2018年第5期12-19,共8页
Aimed at enhancing privacy protection of location-based services( LBS) in mobile Internet environment,an improved privacy scheme of high service quality on the basis of bilinear pairings theory and k-anonymity is pr... Aimed at enhancing privacy protection of location-based services( LBS) in mobile Internet environment,an improved privacy scheme of high service quality on the basis of bilinear pairings theory and k-anonymity is proposed. In circular region of Euclidian distance,mobile terminal evenly generates some false locations,from which half optimal false locations are screened out according to position entropy,location and mapping background information. The anonymity obtains the effective guarantee,so as to realize privacy protection. Through security analyses,the scheme is proved not only to be able to realize such security features as privacy,anonymity and nonforgeability,but also able to resist query tracing attack. And the result of simulation shows that this scheme not only has better evenness in selecting false locations,but also improves efficiency in generating and selecting false nodes. 展开更多
关键词 location-based services (LBS) bilinear pairings K-ANONYMITY privacy protection
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部