Advanced Search



17 results found in all.
index Title
1Optimizing storage performance in public cloud platforms
Author(s):Jian-zong Wang, Peter Varman, Chang-sheng Xie  Clicked:11694  Download:5600  Cited:6  <Full Text>
Journal of Zhejiang University Science C  2011 Vol.12 No.12 P.951-964  DOI:10.1631/jzus.C1100097
2Efficient revocation in ciphertext-policy attribute-based encryption based cryptographic cloud storage
Author(s):Yong Cheng, Zhi-ying Wang, Jun Ma, Jiang-jiang Wu, Song-zhu Mei, Jiang-chun Ren  Clicked:12864  Download:10207  Cited:14  <Full Text>
Journal of Zhejiang University Science C  2013 Vol.14 No.2 P.85-97  DOI:10.1631/jzus.C1200240
3NaEPASC: a novel and efficient public auditing scheme for cloud data
Author(s):Shuang Tan, Yan Jia  Clicked:12673  Download:9543  Cited:7  <Full Text>  <PPT> 3123
Journal of Zhejiang University Science C  2014 Vol.15 No.9 P.794-804  DOI:10.1631/jzus.C1400045
4Analyzing the service availability of mobile cloud computing systems by fluid-flow approximation
Author(s):Hong-wu Lv, Jun-yu Lin, Hui-qiang Wang, Guang-sheng Feng, Mo Zhou  Clicked:10251  Download:4458  Cited:2  <Full Text>  <PPT> 2987
Frontiers of Information Technology & Electronic Engineering  2015 Vol.16 No.7 P.553-567  DOI:10.1631/FITEE.1400410
5Cryptanalysis of an identity-based public auditing protocol for cloud storage
Author(s):Li-bing Wu, Jing Wang, De-biao He, Muhammad-Khurram Khan  Clicked:10244  Download:4558  Cited:0  <Full Text>  <PPT> 3041
Frontiers of Information Technology & Electronic Engineering  2017 Vol.18 No.12 P.1972-1977  DOI:10.1631/FITEE.1601530
6Post-exascale supercomputing: research opportunities abound
Author(s):Zuo-ning Chen, Jack Dongarra, Zhi-wei Xu  Clicked:7373  Download:4518  Cited:0  <Full Text>
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.10 P.1203-1208  DOI:10.1631/FITEE.1830000
7Generic user revocation systems for attribute-based encryption in cloud storage
Author(s):Genlang Chen, Zhiqian Xu, Hai Jiang, Kuan-ching Li  Clicked:9037  Download:4452  Cited:0  <Full Text>  <PPT> 2801
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.11 P.1362-1384  DOI:10.1631/FITEE.1800405
8A secure data sharing scheme with cheating detection based on Chaum-Pedersen protocol for cloud storage
Author(s):Xin Wang, Bo Yang, Zhe Xia, Hong-xia Hou  Clicked:10226  Download:4245  Cited:0  <Full Text>  <PPT> 2555
Frontiers of Information Technology & Electronic Engineering  2019 Vol.20 No.6 P.787-800  DOI:10.1631/FITEE.1800066
9Generic attribute revocation systems for attribute-based encryption in cloud storage
Author(s):Genlang Chen, Zhiqian Xu, Jia-jian Zhang, Guo-jun Wang, Hai Jiang, Miao-qing Huang  Clicked:10110  Download:3937  Cited:0  <Full Text>  <PPT> 2600
Frontiers of Information Technology & Electronic Engineering  2019 Vol.20 No.6 P.773-786  DOI:10.1631/FITEE.1800512
10MULKASE: a novel approach for key-aggregate searchable encryption for multi-owner data
Author(s):Mukti Padhya, Devesh C. Jinwala  Clicked:9549  Download:4984  Cited:0  <Full Text>  <PPT> 2242
Frontiers of Information Technology & Electronic Engineering  2019 Vol.20 No.12 P.1717-1748  DOI:10.1631/FITEE.1800192
11MEACC: an energy-efficient framework for smart devices using cloud computing systems
Author(s):Khalid Alsubhi, Zuhaib Imtiaz, Ayesha Raana, M. Usman Ashraf, Babur Hayat  Clicked:9048  Download:10008  Cited:0  <Full Text>  <PPT> 2704
Frontiers of Information Technology & Electronic Engineering  2020 Vol.21 No.6 P.917-930  DOI:10.1631/FITEE.1900198
12A power resource dispatching framework with a privacy protection function in the Power Internet of Things
Author(s):Shuanggen LIU, Shuangzi ZHENG, Wenbo ZHANG, Runsheng FU  Clicked:5201  Download:8808  Cited:0  <Full Text>  <PPT> 1197
Frontiers of Information Technology & Electronic Engineering  2022 Vol.23 No.9 P.1354-1368  DOI:10.1631/FITEE.2100518
13Public key based bidirectional shadow image authentication without pixel expansion in image secret sharing
Author(s):Xuehu YAN, Longlong LI, Jia CHEN, Lei SUN  Clicked:4692  Download:16962  Cited:0  <Full Text>  <PPT> 1323
Frontiers of Information Technology & Electronic Engineering  2023 Vol.24 No.1 P.88-103  DOI:10.1631/FITEE.2200118
14NEHASH: high-concurrency extendible hashing for non-volatile memory
Author(s):Tao CAI, Pengfei GAO, Dejiao NIU, Yueming MA, Tianle LEI, Jianfei DAI  Clicked:4273  Download:6337  Cited:0  <Full Text>  <PPT> 1081
Frontiers of Information Technology & Electronic Engineering  2023 Vol.24 No.5 P.703-715  DOI:10.1631/FITEE.2200462
15Design and application of new storage systems
Author(s):Guangyan ZHANG, Dan FENG, Keqin LI, Zili SHAO, Nong XIAO, Jin XIONG, Weimin ZHENG  Clicked:3597  Download:5897  Cited:0  <Full Text>
Frontiers of Information Technology & Electronic Engineering  2023 Vol.24 No.5 P.633-636  DOI:10.1631/FITEE.2310000
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2026 Journal of Zhejiang University-SCIENCE