Advanced Search



157 results found in all.
index Title
16Multipurpose audio watermarking algorithm
Author(s):Ning CHEN, Jie ZHU  Clicked:7494  Download:4062  Cited:5  <Full Text>
Journal of Zhejiang University Science A  2008 Vol.9 No.4 P.517-523  DOI:10.1631/jzus.A071493
17Integrated criteria for covert channel auditing
Author(s):Chang-da WANG, Shi-guang JU  Clicked:6166  Download:4046  Cited:0  <Full Text>
Journal of Zhejiang University Science A  2008 Vol.9 No.6 P.737-743  DOI:10.1631/jzus.A071510
18Cryptanalysis of an image encryption scheme based on the Hill cipher
Author(s):Cheng-qing LI, Dan ZHANG, Guan-rong CHEN  Clicked:7450  Download:4726  Cited:7  <Full Text>
Journal of Zhejiang University Science A  2008 Vol.9 No.8 P.1118-1123  DOI:10.1631/jzus.A0720102
19Improved Feistel-based ciphers for wireless sensor network security
Author(s):Tamara PAZYNYUK, Jian-zhong LI, George S. OREKU  Clicked:8442  Download:6670  Cited:1  <Full Text>
Journal of Zhejiang University Science A  2008 Vol.9 No.8 P.1111-1117  DOI:10.1631/jzus.A0720108
20Comments on “How to repair the Hill cipher”
Author(s):Y. RANGEL-ROMERO, R. VEGA-GARCÍA, A. MENCHACA-MÉNDEZ, D. ACOLTZI-CERVANTES, L. MARTÍNEZ-RAMOS, M. MECATE-ZAMBRANO, F. MONTALVO-LEZAMA, J. BARRÓN-VIDALES, N. CORTEZ-DUARTE, F. RODRÍGUEZ-HENRÍQUEZ  Clicked:7451  Download:4511  Cited:5  <Full Text>
Journal of Zhejiang University Science A  2008 Vol.9 No.2 P.211-214  DOI:10.1631/jzus.A072143
21Optimum allocation of FACTS devices in Fars Regional Electric Network using genetic algorithm based goal attainment
Author(s):Mohsen GITIZADEH, Mohsen KALANTAR  Clicked:9808  Download:5240  Cited:4  <Full Text>
Journal of Zhejiang University Science A  2009 Vol.10 No.4 P.478-487  DOI:10.1631/jzus.A0820130
22WAPN: a distributed wormhole attack detection approach for wireless sensor networks
Author(s):Fan-rui KONG, Chun-wen LI, Qing-qing DING, Guang-zhao CUI, Bing-yi CUI  Clicked:9714  Download:4824  Cited:5  <Full Text>
Journal of Zhejiang University Science A  2009 Vol.10 No.2 P.279-289  DOI:10.1631/jzus.A0820178
23Distributed anonymous data perturbation method for privacy-preserving data mining
Author(s):Feng LI, Jin MA, Jian-hua LI  Clicked:7988  Download:5794  Cited:3  <Full Text>
Journal of Zhejiang University Science A  2009 Vol.10 No.7 P.952-963  DOI:10.1631/jzus.A0820320
24Liquid film dryout model for predicting critical heat flux in annular two-phase flow
Author(s):Bo JIAO, Li-min QIU, Jun-liang LU, Zhi-hua GAN  Clicked:9518  Download:5710  Cited:8  <Full Text>
Journal of Zhejiang University Science A  2009 Vol.10 No.3 P.398-417  DOI:10.1631/jzus.A0820322
25Certificateless key-insulated signature without random oracles
Author(s):Zhong-mei WAN, Xue-jia LAI, Jian WENG, Sheng-li LIU, Yu LONG, Xuan HONG  Clicked:7614  Download:4171  Cited:8  <Full Text>
Journal of Zhejiang University Science A  2009 Vol.10 No.12 P.1790-1800  DOI:10.1631/jzus.A0820714
26A new protocol of wide use for e-mail with perfect forward secrecy
Author(s):Tzung-her CHEN, Yan-ting WU  Clicked:9858  Download:5004  Cited:1  <Full Text>
Journal of Zhejiang University Science C  2010 Vol.11 No.1 P.74-78  DOI:10.1631/jzus.A0910126
27Groundwater protection: What can we learn from Germany?
Author(s):Yan ZHU, Klaus-Dieter BALKE  Clicked:6927  Download:3686  Cited:3  <Full Text>
Journal of Zhejiang University Science B  2008 Vol.9 No.3 P.227-231  DOI:10.1631/jzus.B0710639
28Proactive worm propagation modeling and analysis in unstructured peer-to-peer networks
Author(s):Xiao-song ZHANG, Ting CHEN, Jiong ZHENG, Hua LI  Clicked:14224  Download:5464  Cited:8  <Full Text>
Journal of Zhejiang University Science C  2010 Vol.11 No.2 P.119-129  DOI:10.1631/jzus.C0910488
29Building a highly available and intrusion tolerant database security and protection system (DSPS)
Author(s):CAI Liang, YANG Xiao-hu, DONG Jin-xiang  Clicked:5392  Download:3120  Cited:0  <Full Text>
Journal of Zhejiang University Science  2003 Vol.4 No.3 P.287-293  DOI:10.1631/jzus.2003.0287
30Distributed heterogeneous inspecting system and its middleware-based solution
Author(s):HUANG Li-can, WU Zhao-hui, PAN Yun-he  Clicked:6197  Download:3152  Cited:0  <Full Text>
Journal of Zhejiang University Science  2003 Vol.4 No.5 P.542-548  DOI:10.1631/jzus.2003.0542
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2026 Journal of Zhejiang University-SCIENCE