Advanced Search



173 results found in all.
index Title
31Building a highly available and intrusion tolerant database security and protection system (DSPS)
Author(s):CAI Liang, YANG Xiao-hu, DONG Jin-xiang  Clicked:5391  Download:3120  Cited:0  <Full Text>
Journal of Zhejiang University Science  2003 Vol.4 No.3 P.287-293  DOI:10.1631/jzus.2003.0287
32Distributed heterogeneous inspecting system and its middleware-based solution
Author(s):HUANG Li-can, WU Zhao-hui, PAN Yun-he  Clicked:6197  Download:3152  Cited:0  <Full Text>
Journal of Zhejiang University Science  2003 Vol.4 No.5 P.542-548  DOI:10.1631/jzus.2003.0542
33A MUTUAL NON-REPUDIATION PROTOCOL WITH PRIVACY
Author(s):JIANG Xiao-ning, YE Cheng-qing  Clicked:6198  Download:3311  Cited:0  <Full Text>
Journal of Zhejiang University Science  2000 Vol.1 No.3 P.317-321  DOI:10.1631/jzus.2000.0317
34A novel multisignature scheme for a special verifier group against clerk and rogue-key attacks
Author(s):Jia-lun Tsai, Tzong-chen Wu, Kuo-yu Tsai  Clicked:10226  Download:3922  Cited:1  <Full Text>
Journal of Zhejiang University Science C  2010 Vol.11 No.4 P.290-295  DOI:10.1631/jzus.C0910457
35Untraceable partially blind signature based on DLOG problem
Author(s):HUANG Zheng, CHEN Ke-fei, KOU Wei-dong  Clicked:6173  Download:3252  Cited:3  <Full Text>
Journal of Zhejiang University Science  2004 Vol.5 No.1 P.40-44  DOI:10.1631/jzus.2004.0040
36Verifiable threshold signature schemes against conspiracy attack
Author(s):GAN Yuan-ju  Clicked:6396  Download:3716  Cited:0  <Full Text>
Journal of Zhejiang University Science  2004 Vol.5 No.1 P.50-54  DOI:10.1631/jzus.2004.0050
37A reference model for database security proxy
Author(s):CAI Liang, YANG Xiao-hu, DONG Jin-xiang  Clicked:5673  Download:3350  Cited:0  <Full Text>
Journal of Zhejiang University Science  2002 Vol.3 No.1 P.30-36  DOI:10.1631/jzus.2002.0030
38Estimation of financial loss ratio for E-insurance: a quantitative model
Author(s):ZHONG Yuan-sheng, CHEN De-ren, SHI Min-hua  Clicked:5090  Download:3160  Cited:0  <Full Text>
Journal of Zhejiang University Science  2002 Vol.3 No.2 P.140-147  DOI:10.1631/jzus.2002.0140
39A new asymmetric watermarking scheme based on a real fractional DCT-I transform
Author(s):Gui Guo-fu, Jiang Ling-ge, He Chen  Clicked:7454  Download:3230  Cited:1  <Full Text>
Journal of Zhejiang University Science A  2006 Vol.7 No.3 P.285-288  DOI:10.1631/jzus.2006.A0285
40Minimal role mining method for Web service composition
Author(s):Chao Huang, Jian-ling Sun, Xin-yu Wang, Yuan-jie Si  Clicked:10133  Download:3903  Cited:4  <Full Text>
Journal of Zhejiang University Science C  2010 Vol.11 No.5 P.328-339  DOI:10.1631/jzus.C0910186
41A fine-grained access control model for relational databases
Author(s):Jie Shi, Hong Zhu  Clicked:10144  Download:4327  Cited:6  <Full Text>
Journal of Zhejiang University Science C  2010 Vol.11 No.8 P.575-586  DOI:10.1631/jzus.C0910466
42Quasi-distributed sensing network based on coherence multiplexing and spatial division multiplexing for coal mine security monitoring
Author(s):Tian-hao Xia, Wei-sheng Liu, Bin Zhou, Bo-bo Gu, Chun-sheng Yan  Clicked:11226  Download:3787  Cited:0  <Full Text>
Journal of Zhejiang University Science C  2010 Vol.11 No.10 P.762-766  DOI:10.1631/jzus.C0910716
43A new data normalization method for unsupervised anomaly intrusion detection
Author(s):Long-zheng Cai, Jian Chen, Yun Ke, Tao Chen, Zhi-gang Li  Clicked:10639  Download:4350  Cited:2  <Full Text>
Journal of Zhejiang University Science C  2010 Vol.11 No.10 P.778-784  DOI:10.1631/jzus.C0910625
44Efficient password authentication schemes based on a geometric approach for a multi-server environment
Author(s):Horng-Twu Liaw, Chih-Ta Yen, Meng-Yu Chiu, Li-Lin Hsiao  Clicked:9802  Download:3479  Cited:1  <Full Text>
Journal of Zhejiang University Science C  2010 Vol.11 No.12 P.989-997  DOI:10.1631/jzus.C0910712
45A three-level authenticated conference key establishment protocol for UMTS networks
Author(s):Chung-Fu Lu, Tzong-Chen Wu, Chien-Lung Hsu  Clicked:9541  Download:4210  Cited:1  <Full Text>
Journal of Zhejiang University Science C  2011 Vol.12 No.5 P.371-378  DOI:10.1631/jzus.C1000194
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2026 Journal of Zhejiang University-SCIENCE