
| index | Title |
| 1 | An application-layer based centralized information access control for VPN Author(s):Ouyang Kai, Zhou Jing-li, Xia Tao,... Clicked:8427 Download:3944 Cited:0 <Full Text> Journal of Zhejiang University Science A 2006 Vol.7 No.2 P.240-249 DOI:10.1631/jzus.2006.A0240 |
| 2 | A practical and dynamic key management scheme for a user hierarchy Author(s):Jeng Fuh-gwo, Wang Chung-ming Clicked:7534 Download:3481 Cited:1 <Full Text> Journal of Zhejiang University Science A 2006 Vol.7 No.3 P.296-301 DOI:10.1631/jzus.2006.A0296 |
| 3 | Network-adaptive HD MPEG-2 video streaming with cross-layered channel monitoring in WLAN Author(s):Park Sanghoon, Yoon Hayoung, Kim J... Clicked:7593 Download:3935 Cited:9 <Full Text> Journal of Zhejiang University Science A 2006 Vol.7 No.5 P.885-893 DOI:10.1631/jzus.2006.A0885 |
| 4 | A cross-layer design approach on spectrum allocation and resource scheduling in cognitive PMP networks Author(s):Jie CHEN, Min-jian ZHAO, Qiao ZHOU... Clicked:8310 Download:4307 Cited:0 <Full Text> Journal of Zhejiang University Science A 2008 Vol.9 No.4 P.435-444 DOI:10.1631/jzus.A071373 |
| 5 | A cross-layer approach to enable multipacket transmission in MIMO-SDMA based WLAN Author(s):Sheng-bo CHEN, Wei CHEN, Wei-lan H... Clicked:9193 Download:4413 Cited:1 <Full Text> Journal of Zhejiang University Science A 2009 Vol.10 No.2 P.271-278 DOI:10.1631/jzus.A0820362 |
| 6 | Conflict detection and resolution for authorization policies in workflow systems Author(s):Chen-hua MA, Guo-dong LU, Jiong QIU Clicked:7352 Download:3856 Cited:4 <Full Text> Journal of Zhejiang University Science A 2009 Vol.10 No.8 P.1082-1092 DOI:10.1631/jzus.A0820366 |
| 7 | Consistency maintenance for constraint in role-based access control model Author(s):HAN Wei-li, CHEN Gang, YIN Jian-we... Clicked:6499 Download:3299 Cited:0 <Full Text> Journal of Zhejiang University Science 2002 Vol.3 No.3 P.292-297 DOI:10.1631/jzus.2002.0292 |
| 8 | Minimal role mining method for Web service composition Author(s):Chao Huang, Jian-ling Sun, Xin-yu ... Clicked:10145 Download:3904 Cited:4 <Full Text> Journal of Zhejiang University Science C 2010 Vol.11 No.5 P.328-339 DOI:10.1631/jzus.C0910186 |
| 9 | A fine-grained access control model for relational databases Author(s):Jie Shi, Hong Zhu Clicked:10154 Download:4327 Cited:6 <Full Text> Journal of Zhejiang University Science C 2010 Vol.11 No.8 P.575-586 DOI:10.1631/jzus.C0910466 |
| 10 | An authorization model for collaborative access control Author(s):Chen-hua Ma, Guo-dong Lu, Jiong Qiu Clicked:9193 Download:3607 Cited:3 <Full Text> Journal of Zhejiang University Science C 2010 Vol.11 No.9 P.699-717 DOI:10.1631/jzus.C0910564 |
| 11 | Funneling media access control (MAC) protocol for underwater acoustic sensor networks Author(s):Guang-yu Fan, Hui-fang Chen, Lei X... Clicked:10829 Download:4545 Cited:2 <Full Text> Journal of Zhejiang University Science C 2011 Vol.12 No.11 P.932-941 DOI:10.1631/jzus.C1000388 |
| 12 | Efficient revocation in ciphertext-policy attribute-based encryption based cryptographic cloud storage Author(s):Yong Cheng, Zhi-ying Wang, Jun Ma,... Clicked:12874 Download:10231 Cited:14 <Full Text> Journal of Zhejiang University Science C 2013 Vol.14 No.2 P.85-97 DOI:10.1631/jzus.C1200240 |
| 13 | Reliable beacon transmission based MAC protocol for LR-WPANs over WLAN interferences Author(s):Ji-Hoon Park, Byung-Seo Kim Clicked:10355 Download:4883 Cited:2 <Full Text> <PPT> 2853 Journal of Zhejiang University Science C 2014 Vol.15 No.6 P.470-481 DOI:10.1631/jzus.C1300269 |
| 14 | A slotted floor acquisition multiple access based MAC protocol for underwater acoustic networks with RTS co... Author(s):Liang-fang Qian, Sen-lin Zhang, Me... Clicked:11365 Download:5282 Cited:4 <Full Text> <PPT> 3391 Frontiers of Information Technology & Electronic Engineering 2015 Vol.16 No.3 P.217-226 DOI:10.1631/FITEE.1400187 |
| 15 | Anonymous-address-resolution model Author(s):Guang-jia Song, Zhen-zhou Ji Clicked:9308 Download:5068 Cited:0 <Full Text> <PPT> 2719 Frontiers of Information Technology & Electronic Engineering 2016 Vol.17 No.10 P.1044-1055 DOI:10.1631/FITEE.1500382 |