| index | Title |
| 31 | MULKASE: a novel approach for key-aggregate searchable encryption for multi-owner data Author(s):Mukti Padhya, Devesh C. Jinwala Clicked:9556 Download:4994 Cited:0 <Full Text> <PPT> 2243 Frontiers of Information Technology & Electronic Engineering 2019 Vol.20 No.12 P.1717-1748 DOI:10.1631/FITEE.1800192 |
| 32 | Dynamic analysis, FPGA implementation, and cryptographic application of an autonomous 5D chaotic system with offset boosting Author(s):Sifeu Takougang Kingni, Karthikeyan Rajagopal, Serdar Çiçek, Ashokkumar Srinivasan, Anitha Karthikeyan Clicked:10089 Download:9882 Cited:0 <Full Text> Frontiers of Information Technology & Electronic Engineering 2020 Vol.21 No.6 P.950-961 DOI:10.1631/FITEE.1900167 |
| 33 | A novel color image encryption algorithm based on a fractional-order discrete chaotic neural network and DNA sequence operations Author(s):Li-ping Chen, Hao Yin, Li-guo Yuan, António M. Lopes, J. A. Tenreiro Machado, Ran-chao Wu Clicked:8807 Download:11669 Cited:0 <Full Text> <PPT> 2528 Frontiers of Information Technology & Electronic Engineering 2020 Vol.21 No.6 P.866-879 DOI:10.1631/FITEE.1900709 |
| 34 | Discrete fractional watermark technique Author(s):Zai-rong Wang, Babak Shiri, Dumitru Baleanu Clicked:7786 Download:7401 Cited:0 <Full Text> <PPT> 2390 Frontiers of Information Technology & Electronic Engineering 2020 Vol.21 No.6 P.880-883 DOI:10.1631/FITEE.2000133 |
| 35 | Bio-inspired cryptosystem on the reciprocal domain: DNA strands mutate to secure health data Author(s):S. Aashiq Banu, Rengarajan Amirtharajan Clicked:8919 Download:8051 Cited:0 <Full Text> <PPT> 2611 Frontiers of Information Technology & Electronic Engineering 2021 Vol.22 No.7 P.940-956 DOI:10.1631/FITEE.2000071 |
| 36 | Identity-based threshold proxy re-encryption scheme from lattices and its applications Author(s):Liqiang WU, Yiliang HAN, Xiaoyuan YANG, Minqing ZHANG Clicked:9132 Download:14452 Cited:0 <Full Text> <PPT> 1413 Frontiers of Information Technology & Electronic Engineering 2022 Vol.23 No.2 P.258-277 DOI:10.1631/FITEE.2000366 |
| 37 | Verifier-local revocation group signatures with backward unlinkability from lattices Author(s):Yanhua ZHANG, Ximeng LIU, Yupu HU, Yong GAN, Huiwen JIA Clicked:9422 Download:12026 Cited:0 <Full Text> <PPT> 1310 Frontiers of Information Technology & Electronic Engineering 2022 Vol.23 No.6 P.876-892 DOI:10.1631/FITEE.2000507 |
| 38 | An energy-efficient reconfigurable asymmetric modular cryptographic operation unit for RSA and ECC Author(s):Mengni BIE, Wei LI, Tao CHEN, Longmei NAN, Danyang YANG Clicked:9799 Download:11370 Cited:0 <Full Text> <PPT> 1782 Frontiers of Information Technology & Electronic Engineering 2022 Vol.23 No.1 P.134-144 DOI:10.1631/FITEE.2000325 |
| 39 | A joint image compression and encryption scheme based on a novel coupled map lattice system and DNA operations Author(s):Yuanyuan LI, Xiaoqing YOU, Jianquan LU, Jungang LOU Clicked:4007 Download:7960 Cited:0 <Full Text> <PPT> 1016 Frontiers of Information Technology & Electronic Engineering 2023 Vol.24 No.6 P.813-827 DOI:10.1631/FITEE.2200645 |
| 40 | A novel hybrid cryptosystem based on DQFrFT watermarking and 3D-CLM encryption for healthcare services Author(s):Fatma KHALLAF, Walid EL-SHAFAI, El-Sayed M. EL-RABAIE, Naglaa F. SOLIMAN, Fathi E. Abd EL-SAMIE Clicked:4716 Download:10827 Cited:0 <Full Text> <PPT> 1186 Frontiers of Information Technology & Electronic Engineering 2023 Vol.24 No.7 P.1045-1061 DOI:10.1631/FITEE.2200372 |
| 41 | TPE-H2MWD: an exact thumbnail preserving encryption scheme with hidden Markov model and weighted diffusion Author(s):Xiuli CHAI, Xiuhui CHEN, Yakun MA, Fang ZUO, Zhihua GAN, Yushu ZHANG Clicked:4724 Download:5364 Cited:0 <Full Text> <PPT> 1237 Frontiers of Information Technology & Electronic Engineering 2023 Vol.24 No.8 P.1169-1180 DOI:10.1631/FITEE.2200498 |
| 42 | Reinforcement learning based privacy-preserving consensus tracking control of nonstrict-feedback discrete-time multi-agent systems Author(s):Yang YANG, Fanming HUANG, Dong YUE Clicked:3323 Download:4877 Cited:0 <Full Text> <PPT> 743 Frontiers of Information Technology & Electronic Engineering 2025 Vol.26 No.3 P.456-471 DOI:10.1631/FITEE.2300532 |
| 43 | Reversible data hiding scheme for encrypted JPEG bitstreams using adaptive RZL rotation Author(s):Yongning GUO, Guodong SU, Zhiqiang YAO, Wang ZHOU Clicked:3416 Download:2645 Cited:0 <Full Text> <PPT> 839 Frontiers of Information Technology & Electronic Engineering 2024 Vol.25 No.10 P.1353-1369 DOI:10.1631/FITEE.2300749 |
| 44 | Reversible data hiding in encrypted images based on additive secret sharing and additive joint coding using an intelligent predictor Author(s):Ziyi ZHOU, Chengyue WANG, Kexun YAN, Hui SHI, Xin PANG Clicked:3775 Download:2830 Cited:0 <Full Text> <PPT> 812 Frontiers of Information Technology & Electronic Engineering 2024 Vol.25 No.9 P.1250-1265 DOI:10.1631/FITEE.2300750 |
| 45 | A geographic information encryption system based on Chaos-LSTM and chaos sequence proliferation Author(s):Jia DUAN, Luanyun HU, Qiumei XIAO, Meiting LIU, Wenxin YU Clicked:4206 Download:4874 Cited:0 <Full Text> Frontiers of Information Technology & Electronic Engineering 2025 Vol.26 No.3 P.427-440 DOI:10.1631/FITEE.2300755 |
