| index | Title |
| 1 | Improving the precision of the keyword-matching pornographic text filtering method using a hybrid model Author(s):SU Gui-yang, LI Jian-hua, MA Ying-hua, LI Sheng-hong Clicked:11891 Download:4852 Cited:8 <Full Text> Journal of Zhejiang University Science 2004 Vol.5 No.9 P.1106-1113 DOI:10.1631/jzus.2004.1106 |
| 2 | Cost management based security framework in mobile ad hoc networks Author(s):Yang Rui-jun, Xia Qi, Pan Qun-hua, Wang Wei-nong, Li Ming-lu Clicked:7458 Download:3726 Cited:0 <Full Text> Journal of Zhejiang University Science A 2006 Vol.7 No.4 P.493-501 DOI:10.1631/jzus.2006.A0493 |
| 3 | Protection of mobile location privacy by using blind signature Author(s):LIAO Jian, QI Ying-hao, HUANG Pei-wei, RONG Meng-tian, LI Sheng-hong Clicked:6952 Download:4294 Cited:43 <Full Text> Journal of Zhejiang University Science A 2006 Vol.7 No.6 P.984-989 DOI:10.1631/jzus.2006.A0984 |
| 4 | On ASGS framework: general requirements and an example of implementation Author(s):KULESZA Kamil, KOTULSKI Zbigniew Clicked:7699 Download:4076 Cited:0 <Full Text> Journal of Zhejiang University Science A 2007 Vol.8 No.4 P.511-521 DOI:10.1631/jzus.2007.A0511 |
| 5 | Multiple hashes of single key with passcode for multiple accounts Author(s):LEE Kok-wah, EWE Hong-tat Clicked:7361 Download:4406 Cited:2 <Full Text> Journal of Zhejiang University Science A 2007 Vol.8 No.8 P.1183-1190 DOI:10.1631/jzus.2007.A1183 |
| 6 | Integrated criteria for covert channel auditing Author(s):Chang-da WANG, Shi-guang JU Clicked:6155 Download:4043 Cited:0 <Full Text> Journal of Zhejiang University Science A 2008 Vol.9 No.6 P.737-743 DOI:10.1631/jzus.A071510 |
| 7 | Improved Feistel-based ciphers for wireless sensor network security Author(s):Tamara PAZYNYUK, Jian-zhong LI, George S. OREKU Clicked:8428 Download:6664 Cited:1 <Full Text> Journal of Zhejiang University Science A 2008 Vol.9 No.8 P.1111-1117 DOI:10.1631/jzus.A0720108 |
| 8 | WAPN: a distributed wormhole attack detection approach for wireless sensor networks Author(s):Fan-rui KONG, Chun-wen LI, Qing-qing DING, Guang-zhao CUI, Bing-yi CUI Clicked:9677 Download:4816 Cited:5 <Full Text> Journal of Zhejiang University Science A 2009 Vol.10 No.2 P.279-289 DOI:10.1631/jzus.A0820178 |
| 9 | A new protocol of wide use for e-mail with perfect forward secrecy Author(s):Tzung-her CHEN, Yan-ting WU Clicked:9852 Download:4999 Cited:1 <Full Text> Journal of Zhejiang University Science C 2010 Vol.11 No.1 P.74-78 DOI:10.1631/jzus.A0910126 |
| 10 | Groundwater protection: What can we learn from Germany? Author(s):Yan ZHU, Klaus-Dieter BALKE Clicked:6904 Download:3683 Cited:3 <Full Text> Journal of Zhejiang University Science B 2008 Vol.9 No.3 P.227-231 DOI:10.1631/jzus.B0710639 |
| 11 | Building a highly available and intrusion tolerant database security and protection system (DSPS) Author(s):CAI Liang, YANG Xiao-hu, DONG Jin-xiang Clicked:5378 Download:3118 Cited:0 <Full Text> Journal of Zhejiang University Science 2003 Vol.4 No.3 P.287-293 DOI:10.1631/jzus.2003.0287 |
| 12 | A MUTUAL NON-REPUDIATION PROTOCOL WITH PRIVACY Author(s):JIANG Xiao-ning, YE Cheng-qing Clicked:6166 Download:3307 Cited:0 <Full Text> Journal of Zhejiang University Science 2000 Vol.1 No.3 P.317-321 DOI:10.1631/jzus.2000.0317 |
| 13 | A reference model for database security proxy Author(s):CAI Liang, YANG Xiao-hu, DONG Jin-xiang Clicked:5657 Download:3337 Cited:0 <Full Text> Journal of Zhejiang University Science 2002 Vol.3 No.1 P.30-36 DOI:10.1631/jzus.2002.0030 |
| 14 | Estimation of financial loss ratio for E-insurance: a quantitative model Author(s):ZHONG Yuan-sheng, CHEN De-ren, SHI Min-hua Clicked:5074 Download:3156 Cited:0 <Full Text> Journal of Zhejiang University Science 2002 Vol.3 No.2 P.140-147 DOI:10.1631/jzus.2002.0140 |
| 15 | Minimal role mining method for Web service composition Author(s):Chao Huang, Jian-ling Sun, Xin-yu Wang, Yuan-jie Si Clicked:10103 Download:3899 Cited:4 <Full Text> Journal of Zhejiang University Science C 2010 Vol.11 No.5 P.328-339 DOI:10.1631/jzus.C0910186 |
