| index | Title |
| 31 | A MUTUAL NON-REPUDIATION PROTOCOL WITH PRIVACY Author(s):JIANG Xiao-ning, YE Cheng-qing Clicked:6199 Download:3311 Cited:0 <Full Text> Journal of Zhejiang University Science 2000 Vol.1 No.3 P.317-321 DOI:10.1631/jzus.2000.0317 |
| 32 | A novel multisignature scheme for a special verifier group against clerk and rogue-key attacks Author(s):Jia-lun Tsai, Tzong-chen Wu, Kuo-yu Tsai Clicked:10227 Download:3922 Cited:1 <Full Text> Journal of Zhejiang University Science C 2010 Vol.11 No.4 P.290-295 DOI:10.1631/jzus.C0910457 |
| 33 | Untraceable partially blind signature based on DLOG problem Author(s):HUANG Zheng, CHEN Ke-fei, KOU Wei-dong Clicked:6173 Download:3252 Cited:3 <Full Text> Journal of Zhejiang University Science 2004 Vol.5 No.1 P.40-44 DOI:10.1631/jzus.2004.0040 |
| 34 | Verifiable threshold signature schemes against conspiracy attack Author(s):GAN Yuan-ju Clicked:6398 Download:3716 Cited:0 <Full Text> Journal of Zhejiang University Science 2004 Vol.5 No.1 P.50-54 DOI:10.1631/jzus.2004.0050 |
| 35 | A reference model for database security proxy Author(s):CAI Liang, YANG Xiao-hu, DONG Jin-xiang Clicked:5673 Download:3350 Cited:0 <Full Text> Journal of Zhejiang University Science 2002 Vol.3 No.1 P.30-36 DOI:10.1631/jzus.2002.0030 |
| 36 | Estimation of financial loss ratio for E-insurance: a quantitative model Author(s):ZHONG Yuan-sheng, CHEN De-ren, SHI Min-hua Clicked:5091 Download:3160 Cited:0 <Full Text> Journal of Zhejiang University Science 2002 Vol.3 No.2 P.140-147 DOI:10.1631/jzus.2002.0140 |
| 37 | A new asymmetric watermarking scheme based on a real fractional DCT-I transform Author(s):Gui Guo-fu, Jiang Ling-ge, He Chen Clicked:7454 Download:3230 Cited:1 <Full Text> Journal of Zhejiang University Science A 2006 Vol.7 No.3 P.285-288 DOI:10.1631/jzus.2006.A0285 |
| 38 | Minimal role mining method for Web service composition Author(s):Chao Huang, Jian-ling Sun, Xin-yu Wang, Yuan-jie Si Clicked:10135 Download:3903 Cited:4 <Full Text> Journal of Zhejiang University Science C 2010 Vol.11 No.5 P.328-339 DOI:10.1631/jzus.C0910186 |
| 39 | A fine-grained access control model for relational databases Author(s):Jie Shi, Hong Zhu Clicked:10145 Download:4327 Cited:6 <Full Text> Journal of Zhejiang University Science C 2010 Vol.11 No.8 P.575-586 DOI:10.1631/jzus.C0910466 |
| 40 | Quasi-distributed sensing network based on coherence multiplexing and spatial division multiplexing for coal mine security monitoring Author(s):Tian-hao Xia, Wei-sheng Liu, Bin Zhou, Bo-bo Gu, Chun-sheng Yan Clicked:11227 Download:3787 Cited:0 <Full Text> Journal of Zhejiang University Science C 2010 Vol.11 No.10 P.762-766 DOI:10.1631/jzus.C0910716 |
| 41 | Efficient password authentication schemes based on a geometric approach for a multi-server environment Author(s):Horng-Twu Liaw, Chih-Ta Yen, Meng-Yu Chiu, Li-Lin Hsiao Clicked:9803 Download:3479 Cited:1 <Full Text> Journal of Zhejiang University Science C 2010 Vol.11 No.12 P.989-997 DOI:10.1631/jzus.C0910712 |
| 42 | A three-level authenticated conference key establishment protocol for UMTS networks Author(s):Chung-Fu Lu, Tzong-Chen Wu, Chien-Lung Hsu Clicked:9541 Download:4210 Cited:1 <Full Text> Journal of Zhejiang University Science C 2011 Vol.12 No.5 P.371-378 DOI:10.1631/jzus.C1000194 |
| 43 | An efficient and DoS-resistant user authentication scheme for two-tiered wireless sensor networks Author(s):Rong FAN, Dao-jing HE, Xue-zeng PAN, Ling-di PING Clicked:12520 Download:8617 Cited:17 <Full Text> Journal of Zhejiang University Science C 2011 Vol.12 No.7 P.550-560 DOI:10.1631/jzus.C1000377 |
| 44 | CCA2 secure biometric identity based encryption with constant-size ciphertext Author(s):Yang Yang, Yu-pu Hu, Le-you Zhang, Chun-hui Sun Clicked:10566 Download:4626 Cited:1 <Full Text> Journal of Zhejiang University Science C 2011 Vol.12 No.10 P.819-827 DOI:10.1631/jzus.C1000429 |
| 45 | Efficient revocation in ciphertext-policy attribute-based encryption based cryptographic cloud storage Author(s):Yong Cheng, Zhi-ying Wang, Jun Ma, Jiang-jiang Wu, Song-zhu Mei, Jiang-chun Ren Clicked:12868 Download:10222 Cited:14 <Full Text> Journal of Zhejiang University Science C 2013 Vol.14 No.2 P.85-97 DOI:10.1631/jzus.C1200240 |
