Advanced Search



29 results found in all.
index Title
16Generic attribute revocation systems for attribute-based encryption in cloud storage
Author(s):Genlang Chen, Zhiqian Xu, Jia-jian Zhang, Guo-jun Wang, Hai Jiang, Miao-qing Huang  Clicked:10101  Download:3911  Cited:0  <Full Text>  <PPT> 2596
Frontiers of Information Technology & Electronic Engineering  2019 Vol.20 No.6 P.773-786  DOI:10.1631/FITEE.1800512
17Nanoscale cryptographic architecture design using quantum-dot cellular automata
Author(s):Bikash Debnath, Jadav Chandra Das, Debashis De  Clicked:7781  Download:4633  Cited:0  <Full Text>
Frontiers of Information Technology & Electronic Engineering  2019 Vol.20 No.11 P.1578-1586  DOI:10.1631/FITEE.1800458
18Design and implementation of various datapath architectures for the ANU lightweight cipher on an FPGA
Author(s):Vijay Dahiphale, Gaurav Bansod, Ankur Zambare, Narayan Pisharoty  Clicked:8380  Download:4635  Cited:0  <Full Text>  <PPT> 2286
Frontiers of Information Technology & Electronic Engineering  2020 Vol.21 No.4 P.615-628  DOI:10.1631/FITEE.1800681
19MULKASE: a novel approach for key-aggregate searchable encryption for multi-owner data
Author(s):Mukti Padhya, Devesh C. Jinwala  Clicked:9536  Download:4955  Cited:0  <Full Text>  <PPT> 2236
Frontiers of Information Technology & Electronic Engineering  2019 Vol.20 No.12 P.1717-1748  DOI:10.1631/FITEE.1800192
20Dynamic analysis, FPGA implementation, and cryptographic application of an autonomous 5D chaotic system with offset boosting
Author(s):Sifeu Takougang Kingni, Karthikeyan Rajagopal, Serdar Çiçek, Ashokkumar Srinivasan, Anitha Karthikeyan  Clicked:10068  Download:9845  Cited:0  <Full Text>
Frontiers of Information Technology & Electronic Engineering  2020 Vol.21 No.6 P.950-961  DOI:10.1631/FITEE.1900167
21A novel color image encryption algorithm based on a fractional-order discrete chaotic neural network and DNA sequence operations
Author(s):Li-ping Chen, Hao Yin, Li-guo Yuan, António M. Lopes, J. A. Tenreiro Machado, Ran-chao Wu  Clicked:8739  Download:11623  Cited:0  <Full Text>  <PPT> 2512
Frontiers of Information Technology & Electronic Engineering  2020 Vol.21 No.6 P.866-879  DOI:10.1631/FITEE.1900709
22Discrete fractional watermark technique
Author(s):Zai-rong Wang, Babak Shiri, Dumitru Baleanu  Clicked:7763  Download:7361  Cited:0  <Full Text>  <PPT> 2382
Frontiers of Information Technology & Electronic Engineering  2020 Vol.21 No.6 P.880-883  DOI:10.1631/FITEE.2000133
23Bio-inspired cryptosystem on the reciprocal domain: DNA strands mutate to secure health data
Author(s):S. Aashiq Banu, Rengarajan Amirtharajan  Clicked:8878  Download:8004  Cited:0  <Full Text>  <PPT> 2599
Frontiers of Information Technology & Electronic Engineering  2021 Vol.22 No.7 P.940-956  DOI:10.1631/FITEE.2000071
24Identity-based threshold proxy re-encryption scheme from lattices and its applications
Author(s):Liqiang WU, Yiliang HAN, Xiaoyuan YANG, Minqing ZHANG  Clicked:9100  Download:14410  Cited:0  <Full Text>  <PPT> 1403
Frontiers of Information Technology & Electronic Engineering  2022 Vol.23 No.2 P.258-277  DOI:10.1631/FITEE.2000366
25A novel hybrid cryptosystem based on DQFrFT watermarking and 3D-CLM encryption for healthcare services
Author(s):Fatma KHALLAF, Walid EL-SHAFAI, El-Sayed M. EL-RABAIE, Naglaa F. SOLIMAN, Fathi E. Abd EL-SAMIE  Clicked:4649  Download:10779  Cited:0  <Full Text>  <PPT> 1168
Frontiers of Information Technology & Electronic Engineering  2023 Vol.24 No.7 P.1045-1061  DOI:10.1631/FITEE.2200372
26TPE-H2MWD: an exact thumbnail preserving encryption scheme with hidden Markov model and weighted diffusion
Author(s):Xiuli CHAI, Xiuhui CHEN, Yakun MA, Fang ZUO, Zhihua GAN, Yushu ZHANG  Clicked:4708  Download:5334  Cited:0  <Full Text>  <PPT> 1227
Frontiers of Information Technology & Electronic Engineering  2023 Vol.24 No.8 P.1169-1180  DOI:10.1631/FITEE.2200498
27A geographic information encryption system based on Chaos-LSTM and chaos sequence proliferation
Author(s):Jia DUAN, Luanyun HU, Qiumei XIAO, Meiting LIU, Wenxin YU  Clicked:4171  Download:4761  Cited:0  <Full Text>
Frontiers of Information Technology & Electronic Engineering  2025 Vol.26 No.3 P.427-440  DOI:10.1631/FITEE.2300755
28Efficient privacy-preserving scheme for secure neural network inference
Author(s):Liquan CHEN, Zixuan YANG, Peng ZHANG, Yang MA  Clicked:2171  Download:4604  Cited:0  <Full Text>  <PPT> 518
Frontiers of Information Technology & Electronic Engineering  2025 Vol.26 No.9 P.1609-1623  DOI:10.1631/FITEE.2400371
29SPJEU: a self-sufficient plaintext-related JPEG image encryption scheme based on a unified key
Author(s):Ming LI, Wenwen ZHOU, Mengdie WANG, Yushu ZHANG, Yong XIANG  Clicked:2159  Download:4321  Cited:0  <Full Text>
Frontiers of Information Technology & Electronic Engineering  2025 Vol.26 No.6 P.847-861  DOI:10.1631/FITEE.2400721
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2026 Journal of Zhejiang University-SCIENCE