Advanced Search



49 results found in all.
index Title
31MULKASE: a novel approach for key-aggregate searchable encryption for multi-owner data
Author(s):Mukti Padhya, Devesh C. Jinwala  Clicked:9556  Download:4994  Cited:0  <Full Text>  <PPT> 2243
Frontiers of Information Technology & Electronic Engineering  2019 Vol.20 No.12 P.1717-1748  DOI:10.1631/FITEE.1800192
32Dynamic analysis, FPGA implementation, and cryptographic application of an autonomous 5D chaotic system with offset boosting
Author(s):Sifeu Takougang Kingni, Karthikeyan Rajagopal, Serdar Çiçek, Ashokkumar Srinivasan, Anitha Karthikeyan  Clicked:10089  Download:9882  Cited:0  <Full Text>
Frontiers of Information Technology & Electronic Engineering  2020 Vol.21 No.6 P.950-961  DOI:10.1631/FITEE.1900167
33A novel color image encryption algorithm based on a fractional-order discrete chaotic neural network and DNA sequence operations
Author(s):Li-ping Chen, Hao Yin, Li-guo Yuan, António M. Lopes, J. A. Tenreiro Machado, Ran-chao Wu  Clicked:8807  Download:11669  Cited:0  <Full Text>  <PPT> 2528
Frontiers of Information Technology & Electronic Engineering  2020 Vol.21 No.6 P.866-879  DOI:10.1631/FITEE.1900709
34Discrete fractional watermark technique
Author(s):Zai-rong Wang, Babak Shiri, Dumitru Baleanu  Clicked:7786  Download:7401  Cited:0  <Full Text>  <PPT> 2390
Frontiers of Information Technology & Electronic Engineering  2020 Vol.21 No.6 P.880-883  DOI:10.1631/FITEE.2000133
35Bio-inspired cryptosystem on the reciprocal domain: DNA strands mutate to secure health data
Author(s):S. Aashiq Banu, Rengarajan Amirtharajan  Clicked:8919  Download:8051  Cited:0  <Full Text>  <PPT> 2611
Frontiers of Information Technology & Electronic Engineering  2021 Vol.22 No.7 P.940-956  DOI:10.1631/FITEE.2000071
36Identity-based threshold proxy re-encryption scheme from lattices and its applications
Author(s):Liqiang WU, Yiliang HAN, Xiaoyuan YANG, Minqing ZHANG  Clicked:9132  Download:14452  Cited:0  <Full Text>  <PPT> 1413
Frontiers of Information Technology & Electronic Engineering  2022 Vol.23 No.2 P.258-277  DOI:10.1631/FITEE.2000366
37Verifier-local revocation group signatures with backward unlinkability from lattices
Author(s):Yanhua ZHANG, Ximeng LIU, Yupu HU, Yong GAN, Huiwen JIA  Clicked:9422  Download:12026  Cited:0  <Full Text>  <PPT> 1310
Frontiers of Information Technology & Electronic Engineering  2022 Vol.23 No.6 P.876-892  DOI:10.1631/FITEE.2000507
38An energy-efficient reconfigurable asymmetric modular cryptographic operation unit for RSA and ECC
Author(s):Mengni BIE, Wei LI, Tao CHEN, Longmei NAN, Danyang YANG  Clicked:9799  Download:11370  Cited:0  <Full Text>  <PPT> 1782
Frontiers of Information Technology & Electronic Engineering  2022 Vol.23 No.1 P.134-144  DOI:10.1631/FITEE.2000325
39A joint image compression and encryption scheme based on a novel coupled map lattice system and DNA operations
Author(s):Yuanyuan LI, Xiaoqing YOU, Jianquan LU, Jungang LOU  Clicked:4007  Download:7960  Cited:0  <Full Text>  <PPT> 1016
Frontiers of Information Technology & Electronic Engineering  2023 Vol.24 No.6 P.813-827  DOI:10.1631/FITEE.2200645
40A novel hybrid cryptosystem based on DQFrFT watermarking and 3D-CLM encryption for healthcare services
Author(s):Fatma KHALLAF, Walid EL-SHAFAI, El-Sayed M. EL-RABAIE, Naglaa F. SOLIMAN, Fathi E. Abd EL-SAMIE  Clicked:4716  Download:10827  Cited:0  <Full Text>  <PPT> 1186
Frontiers of Information Technology & Electronic Engineering  2023 Vol.24 No.7 P.1045-1061  DOI:10.1631/FITEE.2200372
41TPE-H2MWD: an exact thumbnail preserving encryption scheme with hidden Markov model and weighted diffusion
Author(s):Xiuli CHAI, Xiuhui CHEN, Yakun MA, Fang ZUO, Zhihua GAN, Yushu ZHANG  Clicked:4724  Download:5364  Cited:0  <Full Text>  <PPT> 1237
Frontiers of Information Technology & Electronic Engineering  2023 Vol.24 No.8 P.1169-1180  DOI:10.1631/FITEE.2200498
42Reinforcement learning based privacy-preserving consensus tracking control of nonstrict-feedback discrete-time multi-agent systems
Author(s):Yang YANG, Fanming HUANG, Dong YUE  Clicked:3323  Download:4877  Cited:0  <Full Text>  <PPT> 743
Frontiers of Information Technology & Electronic Engineering  2025 Vol.26 No.3 P.456-471  DOI:10.1631/FITEE.2300532
43Reversible data hiding scheme for encrypted JPEG bitstreams using adaptive RZL rotation
Author(s):Yongning GUO, Guodong SU, Zhiqiang YAO, Wang ZHOU  Clicked:3416  Download:2645  Cited:0  <Full Text>  <PPT> 839
Frontiers of Information Technology & Electronic Engineering  2024 Vol.25 No.10 P.1353-1369  DOI:10.1631/FITEE.2300749
44Reversible data hiding in encrypted images based on additive secret sharing and additive joint coding using an intelligent predictor
Author(s):Ziyi ZHOU, Chengyue WANG, Kexun YAN, Hui SHI, Xin PANG  Clicked:3775  Download:2830  Cited:0  <Full Text>  <PPT> 812
Frontiers of Information Technology & Electronic Engineering  2024 Vol.25 No.9 P.1250-1265  DOI:10.1631/FITEE.2300750
45A geographic information encryption system based on Chaos-LSTM and chaos sequence proliferation
Author(s):Jia DUAN, Luanyun HU, Qiumei XIAO, Meiting LIU, Wenxin YU  Clicked:4206  Download:4874  Cited:0  <Full Text>
Frontiers of Information Technology & Electronic Engineering  2025 Vol.26 No.3 P.427-440  DOI:10.1631/FITEE.2300755
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2026 Journal of Zhejiang University-SCIENCE