index | Title |
1 | A practical and dynamic key management scheme for a user hierarchy Author(s):Jeng Fuh-gwo, Wang Chung-ming Clicked:6228 Download:2993 Cited:1 <Full Text> Journal of Zhejiang University Science A 2006 Vol.7 No.3 P.296-301 DOI:10.1631/jzus.2006.A0296 |
2 | A new protocol of wide use for e-mail with perfect forward secrecy Author(s):Tzung-her CHEN, Yan-ting WU Clicked:8947 Download:3728 Cited:1 <Full Text> Journal of Zhejiang University Science A 2010 Vol.11 No.1 P.74-78 DOI:10.1631/jzus.A0910126 |
3 | Building a highly available and intrusion tolerant database security and protection system (DSPS) Author(s):CAI Liang, YANG Xiao-hu, DONG Jin-... Clicked:4522 Download:2708 Cited:0 <Full Text> Journal of Zhejiang University Science 2003 Vol.4 No.3 P.287-293 DOI:10.1631/jzus.2003.0287 |
4 | NaEPASC: a novel and efficient public auditing scheme for cloud data Author(s):Shuang Tan, Yan Jia Clicked:11250 Download:5321 Cited:7 <Full Text> <PPT> 2446 Journal of Zhejiang University Science C 2014 Vol.15 No.9 P.794-804 DOI:10.1631/jzus.C1400045 |
5 | ImgFS: a transparent cryptography for stored images using a filesystem in userspace Author(s):Osama A. Khashan, Abdullah M. Zin,... Clicked:7195 Download:3552 Cited:0 <Full Text> <PPT> 2463 Frontiers of Information Technology & Electronic Engineering 2015 Vol.16 No.1 P.28-42 DOI:10.1631/FITEE.1400133 |
6 | Cryptanalysis of an identity-based public auditing protocol for cloud storage Author(s):Li-bing Wu, Jing Wang, De-biao He,... Clicked:8868 Download:2957 Cited:0 <Full Text> <PPT> 2334 Frontiers of Information Technology & Electronic Engineering 2017 Vol.18 No.12 P.1972-1977 DOI:10.1631/FITEE.1601530 |
7 | NEHASH: high-concurrency extendible hashing for non-volatile memory Author(s):Tao CAI, Pengfei GAO, Dejiao NIU, ... Clicked:2763 Download:3192 Cited:0 <Full Text> <PPT> 504 Frontiers of Information Technology & Electronic Engineering 2023 Vol.24 No.5 P.703-715 DOI:10.1631/FITEE.2200462 |
8 | SPJEU: a self-sufficient plaintext-related JPEG image encryption scheme based on a unified key Author(s):Ming LI, Wenwen ZHOU, Mengdie WAN,... Clicked:571 Download:483 Cited:0 <Full Text> Frontiers of Information Technology & Electronic Engineering 1998 Vol.-1 No.-1 P. DOI:10.1631/FITEE.2400721 |