| index | Title |
| 1 | An application-layer based centralized information access control for VPN Author(s):Ouyang Kai, Zhou Jing-li, Xia Tao, Yu Sheng-sheng Clicked:8393 Download:3934 Cited:0 <Full Text> Journal of Zhejiang University Science A 2006 Vol.7 No.2 P.240-249 DOI:10.1631/jzus.2006.A0240 |
| 2 | A cross-layer approach to enable multipacket transmission in MIMO-SDMA based WLAN Author(s):Sheng-bo CHEN, Wei CHEN, Wei-lan HUANG, Li-jun ZHAI, Xu-ming LIU Clicked:9151 Download:4398 Cited:1 <Full Text> Journal of Zhejiang University Science A 2009 Vol.10 No.2 P.271-278 DOI:10.1631/jzus.A0820362 |
| 3 | Consistency maintenance for constraint in role-based access control model Author(s):HAN Wei-li, CHEN Gang, YIN Jian-wei, DONG Jin-xiang Clicked:6479 Download:3295 Cited:0 <Full Text> Journal of Zhejiang University Science 2002 Vol.3 No.3 P.292-297 DOI:10.1631/jzus.2002.0292 |
| 4 | Minimal role mining method for Web service composition Author(s):Chao Huang, Jian-ling Sun, Xin-yu Wang, Yuan-jie Si Clicked:10106 Download:3900 Cited:4 <Full Text> Journal of Zhejiang University Science C 2010 Vol.11 No.5 P.328-339 DOI:10.1631/jzus.C0910186 |
| 5 | A fine-grained access control model for relational databases Author(s):Jie Shi, Hong Zhu Clicked:10128 Download:4326 Cited:6 <Full Text> Journal of Zhejiang University Science C 2010 Vol.11 No.8 P.575-586 DOI:10.1631/jzus.C0910466 |
| 6 | An authorization model for collaborative access control Author(s):Chen-hua Ma, Guo-dong Lu, Jiong Qiu Clicked:9175 Download:3605 Cited:3 <Full Text> Journal of Zhejiang University Science C 2010 Vol.11 No.9 P.699-717 DOI:10.1631/jzus.C0910564 |
| 7 | Funneling media access control (MAC) protocol for underwater acoustic sensor networks Author(s):Guang-yu Fan, Hui-fang Chen, Lei Xie, Kuang Wang Clicked:10811 Download:4542 Cited:2 <Full Text> Journal of Zhejiang University Science C 2011 Vol.12 No.11 P.932-941 DOI:10.1631/jzus.C1000388 |
| 8 | Efficient revocation in ciphertext-policy attribute-based encryption based cryptographic cloud storage Author(s):Yong Cheng, Zhi-ying Wang, Jun Ma, Jiang-jiang Wu, Song-zhu Mei, Jiang-chun Ren Clicked:12858 Download:10183 Cited:14 <Full Text> Journal of Zhejiang University Science C 2013 Vol.14 No.2 P.85-97 DOI:10.1631/jzus.C1200240 |
| 9 | A slotted floor acquisition multiple access based MAC protocol for underwater acoustic networks with RTS competition Author(s):Liang-fang Qian, Sen-lin Zhang, Mei-qin Liu Clicked:11328 Download:5233 Cited:4 <Full Text> <PPT> 3378 Frontiers of Information Technology & Electronic Engineering 2015 Vol.16 No.3 P.217-226 DOI:10.1631/FITEE.1400187 |
| 10 | Generic user revocation systems for attribute-based encryption in cloud storage Author(s):Genlang Chen, Zhiqian Xu, Hai Jiang, Kuan-ching Li Clicked:9004 Download:4432 Cited:0 <Full Text> <PPT> 2796 Frontiers of Information Technology & Electronic Engineering 2018 Vol.19 No.11 P.1362-1384 DOI:10.1631/FITEE.1800405 |
| 11 | Generic attribute revocation systems for attribute-based encryption in cloud storage Author(s):Genlang Chen, Zhiqian Xu, Jia-jian Zhang, Guo-jun Wang, Hai Jiang, Miao-qing Huang Clicked:10101 Download:3915 Cited:0 <Full Text> <PPT> 2596 Frontiers of Information Technology & Electronic Engineering 2019 Vol.20 No.6 P.773-786 DOI:10.1631/FITEE.1800512 |
| 12 | RCDS: a right-confirmable data-sharing model based on symbol mapping coding and blockchain Author(s):Liang WANG, Shunjiu HUANG, Lina ZUO, Jun LI, Wenyuan LIU Clicked:4705 Download:16023 Cited:0 <Full Text> <PPT> 1161 Frontiers of Information Technology & Electronic Engineering 2023 Vol.24 No.8 P.1194-1213 DOI:10.1631/FITEE.2200659 |
