Author of the publication

How to protect reader lending privacy under a cloud environment: a technical method.

, , , , and . Libr. Hi Tech, 40 (6): 1746-1765 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Query Similarity Computing Based on System Similarity Measurement., , and . ICCPOL, volume 4285 of Lecture Notes in Computer Science, page 42-50. Springer, (2006)A refined method for computing bibliographic coupling strengths., , , , and . J. Informetrics, 13 (2): 605-615 (2019)Guest editorial., , and . Electron. Libr., 35 (4): 622-625 (2017)International collaboration in LIS: global trends and networks at the country and institution level., , , , , and . Scientometrics, 98 (1): 53-72 (2014)The Application of Hypertext Retrieval in Fulltext Retrieval System.. JCIS, page 372-376. JCIS / Association for Intelligent Machinery, Inc., (2002)The academic impact of Chinese humanities and social science research., , and . Aslib Proc., 60 (1): 55-74 (2008)A Method for Measuring Journal Discriminative Capacity and Its Application in WOS., , , and . iConference, volume 12051 of Lecture Notes in Computer Science, page 751-767. Springer, (2020)The design and application value of the Chinese Social Science Citation Index., , and . Scientometrics, 98 (3): 1567-1582 (2014)A comparative study on communication structures of Chinese journals in the social sciences., , and . J. Assoc. Inf. Sci. Technol., 61 (7): 1360-1376 (2010)A dummy-based user privacy protection approach for text information retrieval., , , , and . Knowl. Based Syst., (2020)