| index | Title |
| 1 | Non-interactive identity-based threshold signature scheme without random oracles Author(s):Xun SUN, Jian-hua LI, Shu-tang YANG, Gong-liang CHEN Clicked:7402 Download:4124 Cited:4 <Full Text> Journal of Zhejiang University Science A 2008 Vol.9 No.6 P.727-736 DOI:10.1631/jzus.A0720028 |
| 2 | CCA2 secure biometric identity based encryption with constant-size ciphertext Author(s):Yang Yang, Yu-pu Hu, Le-you Zhang, Chun-hui Sun Clicked:10558 Download:4625 Cited:1 <Full Text> Journal of Zhejiang University Science C 2011 Vol.12 No.10 P.819-827 DOI:10.1631/jzus.C1000429 |
| 3 | NaEPASC: a novel and efficient public auditing scheme for cloud data Author(s):Shuang Tan, Yan Jia Clicked:12680 Download:9564 Cited:7 <Full Text> <PPT> 3127 Journal of Zhejiang University Science C 2014 Vol.15 No.9 P.794-804 DOI:10.1631/jzus.C1400045 |
| 4 | Efficient identity-based signature over NTRU lattice Author(s):Jia Xie, Yu-pu Hu, Jun-tao Gao, Wen Gao Clicked:10111 Download:4708 Cited:4 <Full Text> <PPT> 2550 Frontiers of Information Technology & Electronic Engineering 2016 Vol.17 No.2 P.135-142 DOI:10.1631/FITEE.1500197 |
| 5 | Efficient hierarchical identity based encryption scheme in the standard model over lattices Author(s):Feng-he Wang, Chun-xiao Wang, Zhen-hua Liu Clicked:9581 Download:4705 Cited:0 <Full Text> <PPT> 2587 Frontiers of Information Technology & Electronic Engineering 2016 Vol.17 No.8 P.781-791 DOI:10.1631/FITEE.1500219 |
| 6 | A novel algorithm to counter cross-eye jamming based on a multi-target model Author(s):Zhi-yong Song, Xing-lin Shen, Qiang Fu Clicked:8653 Download:4012 Cited:0 <Full Text> <PPT> 2262 Frontiers of Information Technology & Electronic Engineering 2019 Vol.20 No.7 P.988-1001 DOI:10.1631/FITEE.1800394 |
| 7 | Novel efficient identity-based signature on lattices Author(s):Jiang-shan Chen, Yu-pu Hu, Hong-mei Liang, Wen Gao Clicked:8722 Download:8298 Cited:0 <Full Text> <PPT> 2139 Frontiers of Information Technology & Electronic Engineering 2021 Vol.22 No.2 P.244-250 DOI:10.1631/FITEE.1900318 |
| 8 | Identity-based searchable attribute signcryption in lattice for a blockchain-based medical system Author(s):Huifang YU, Xiaoping BAI Clicked:4001 Download:3217 Cited:0 <Full Text> <PPT> 525 Frontiers of Information Technology & Electronic Engineering 2024 Vol.25 No.3 P.461-471 DOI:10.1631/FITEE.2300248 |
| 9 | Odor representation and coding by the mitral/tufted cells in the olfactory bulb Author(s):Panke WANG, Shan LI, An’an LI Clicked:2949 Download:2774 Cited:0 <Full Text> <PPT> 877 Journal of Zhejiang University Science B 2024 Vol.25 No.10 P.824-840 DOI:10.1631/jzus.B2400051 |
| 10 | Anti-quantum cross-chain identity authentication approach using dynamic group signature Author(s):Huifang YU, Mengjie HUANG Clicked:2107 Download:4471 Cited:0 <Full Text> <PPT> 698 Frontiers of Information Technology & Electronic Engineering 2025 Vol.26 No.5 P.742-752 DOI:10.1631/FITEE.2400443 |
