
| index | Title |
| 1 | A practical and dynamic key management scheme for a user hierarchy Author(s):Jeng Fuh-gwo, Wang Chung-ming Clicked:7469 Download:3468 Cited:1 <Full Text> Journal of Zhejiang University Science A 2006 Vol.7 No.3 P.296-301 DOI:10.1631/jzus.2006.A0296 |
| 2 | A new protocol of wide use for e-mail with perfect forward secrecy Author(s):Tzung-her CHEN, Yan-ting WU Clicked:9847 Download:4996 Cited:1 <Full Text> Journal of Zhejiang University Science A 2010 Vol.11 No.1 P.74-78 DOI:10.1631/jzus.A0910126 |
| 3 | Building a highly available and intrusion tolerant database security and protection system (DSPS) Author(s):CAI Liang, YANG Xiao-hu, DONG Jin-... Clicked:5368 Download:3116 Cited:0 <Full Text> Journal of Zhejiang University Science 2003 Vol.4 No.3 P.287-293 DOI:10.1631/jzus.2003.0287 |
| 4 | NaEPASC: a novel and efficient public auditing scheme for cloud data Author(s):Shuang Tan, Yan Jia Clicked:12652 Download:9472 Cited:7 <Full Text> <PPT> 3114 Journal of Zhejiang University Science C 2014 Vol.15 No.9 P.794-804 DOI:10.1631/jzus.C1400045 |
| 5 | ImgFS: a transparent cryptography for stored images using a filesystem in userspace Author(s):Osama A. Khashan, Abdullah M. Zin,... Clicked:9171 Download:5018 Cited:0 <Full Text> <PPT> 3123 Frontiers of Information Technology & Electronic Engineering 2015 Vol.16 No.1 P.28-42 DOI:10.1631/FITEE.1400133 |
| 6 | Cryptanalysis of an identity-based public auditing protocol for cloud storage Author(s):Li-bing Wu, Jing Wang, De-biao He,... Clicked:10182 Download:4503 Cited:0 <Full Text> <PPT> 3030 Frontiers of Information Technology & Electronic Engineering 2017 Vol.18 No.12 P.1972-1977 DOI:10.1631/FITEE.1601530 |
| 7 | NEHASH: high-concurrency extendible hashing for non-volatile memory Author(s):Tao CAI, Pengfei GAO, Dejiao NIU, ... Clicked:4206 Download:6300 Cited:0 <Full Text> <PPT> 1068 Frontiers of Information Technology & Electronic Engineering 2023 Vol.24 No.5 P.703-715 DOI:10.1631/FITEE.2200462 |
| 8 | SPJEU: a self-sufficient plaintext-related JPEG image encryption scheme based on a unified key Author(s):Ming LI, Wenwen ZHOU, Mengdie WANG... Clicked:2147 Download:4273 Cited:0 <Full Text> Frontiers of Information Technology & Electronic Engineering 2025 Vol.26 No.6 P.847-861 DOI:10.1631/FITEE.2400721 |