| index | Title |
| 16 | A fine-grained access control model for relational databases Author(s):Jie Shi, Hong Zhu Clicked:10133 Download:4327 Cited:6 <Full Text> Journal of Zhejiang University Science C 2010 Vol.11 No.8 P.575-586 DOI:10.1631/jzus.C0910466 |
| 17 | A new data normalization method for unsupervised anomaly intrusion detection Author(s):Long-zheng Cai, Jian Chen, Yun Ke, Tao Chen, Zhi-gang Li Clicked:10631 Download:4348 Cited:2 <Full Text> Journal of Zhejiang University Science C 2010 Vol.11 No.10 P.778-784 DOI:10.1631/jzus.C0910625 |
| 18 | Efficient password authentication schemes based on a geometric approach for a multi-server environment Author(s):Horng-Twu Liaw, Chih-Ta Yen, Meng-Yu Chiu, Li-Lin Hsiao Clicked:9797 Download:3478 Cited:1 <Full Text> Journal of Zhejiang University Science C 2010 Vol.11 No.12 P.989-997 DOI:10.1631/jzus.C0910712 |
| 19 | CCA2 secure biometric identity based encryption with constant-size ciphertext Author(s):Yang Yang, Yu-pu Hu, Le-you Zhang, Chun-hui Sun Clicked:10553 Download:4621 Cited:1 <Full Text> Journal of Zhejiang University Science C 2011 Vol.12 No.10 P.819-827 DOI:10.1631/jzus.C1000429 |
| 20 | A 10 Gbps in-line network security processor based on configurable hetero-multi-cores Author(s):Yun Niu, Li-ji Wu, Yang Liu, Xiang-min Zhang, Hong-yi Chen Clicked:10744 Download:4668 Cited:2 <Full Text> <PPT> 3005 Journal of Zhejiang University Science C 2013 Vol.14 No.8 P.642-651 DOI:10.1631/jzus.C1200370 |
| 21 | Analysis and design of a smart card based authentication protocol Author(s):Kuo-Hui Yeh, Kuo-Yu Tsai, Jia-Li Hou Clicked:10270 Download:4793 Cited:0 <Full Text> <PPT> 2608 Journal of Zhejiang University Science C 2013 Vol.14 No.12 P.909-917 DOI:10.1631/jzus.C1300158 |
| 22 | Botnet detection techniques: review, future trends, and issues Author(s):Ahmad Karim, Rosli Bin Salleh, Muhammad Shiraz, Syed Adeel Ali Shah, Irfan Awan, Nor Badrul Anuar Clicked:23106 Download:27248 Cited:10 <Full Text> <PPT> 3745 Journal of Zhejiang University Science C 2014 Vol.15 No.11 P.943-983 DOI:10.1631/jzus.C1300242 |
| 23 | ImgFS: a transparent cryptography for stored images using a filesystem in userspace Author(s):Osama A. Khashan, Abdullah M. Zin, Elankovan A. Sundararajan Clicked:9194 Download:5057 Cited:0 <Full Text> <PPT> 3138 Frontiers of Information Technology & Electronic Engineering 2015 Vol.16 No.1 P.28-42 DOI:10.1631/FITEE.1400133 |
| 24 | Moving target defense: state of the art and characteristics Author(s):Gui-lin CAI, Bao-sheng WANG, Wei HU, Tian-zuo WANG Clicked:9716 Download:7223 Cited:1 <Full Text> <PPT> 2745 Frontiers of Information Technology & Electronic Engineering 2016 Vol.17 No.11 P.1122-1153 DOI:10.1631/FITEE.1601321 |
| 25 | A lightweight authentication scheme with user untraceability Author(s):Kuo-Hui Yeh Clicked:10801 Download:4806 Cited:2 <Full Text> <PPT> 2965 Frontiers of Information Technology & Electronic Engineering 2015 Vol.16 No.4 P.259-271 DOI:10.1631/FITEE.1400232 |
| 26 | Low-computation certificateless hybrid signcryption scheme Author(s):Hui-fang Yu, Bo Yang Clicked:10362 Download:4364 Cited:0 <Full Text> <PPT> 2674 Frontiers of Information Technology & Electronic Engineering 2017 Vol.18 No.7 P.928-940 DOI:10.1631/FITEE.1601054 |
| 27 | BORON: an ultra-lightweight and low power encryption design for pervasive computing Author(s):Gaurav Bansod, Narayan Pisharoty, Abhijit Patil Clicked:9516 Download:6268 Cited:0 <Full Text> Frontiers of Information Technology & Electronic Engineering 2017 Vol.18 No.3 P.317-331 DOI:10.1631/FITEE.1500415 |
| 28 | Anonymous-address-resolution model Author(s):Guang-jia Song, Zhen-zhou Ji Clicked:9291 Download:5049 Cited:0 <Full Text> <PPT> 2714 Frontiers of Information Technology & Electronic Engineering 2016 Vol.17 No.10 P.1044-1055 DOI:10.1631/FITEE.1500382 |
| 29 | Secrecy performance analysis of single-input multiple-output generalized-K fading channels Author(s):Hong-jiang Lei, Imran Shafique Ansari, Chao Gao, Yong-cai Guo, Gao-feng Pan, Khalid A. Qaraqe Clicked:8935 Download:4594 Cited:0 <Full Text> <PPT> 2753 Frontiers of Information Technology & Electronic Engineering 2016 Vol.17 No.10 P.1074-1084 DOI:10.1631/FITEE.1601070 |
| 30 | Ergodic secrecy capacity of MRC/SC in single-input multiple-output wiretap systems with imperfect channel state information Author(s):Hui Zhao, You-yu Tan, Gao-feng Pan, Yun-fei Chen Clicked:10943 Download:4993 Cited:1 <Full Text> <PPT> 3055 Frontiers of Information Technology & Electronic Engineering 2017 Vol.18 No.4 P.578-590 DOI:10.1631/FITEE.1500430 |
