Advanced Search



12 results found in all.
index Title
1An application-layer based centralized information access control for VPN
Author(s):Ouyang Kai, Zhou Jing-li, Xia Tao, Yu Sheng-sheng  Clicked:6177  Download:2913  Cited:0  <Full Text>
Journal of Zhejiang University Science A  2006 Vol.7 No.2 P.240-249  DOI:10.1631/jzus.2006.A0240
2A cross-layer approach to enable multipacket transmission in MIMO-SDMA based WLAN
Author(s):Sheng-bo CHEN, Wei CHEN, Wei-lan HUANG, Li-jun ZHAI, Xu-ming LIU  Clicked:6909  Download:3309  Cited:1  <Full Text>
Journal of Zhejiang University Science A  2009 Vol.10 No.2 P.271-278  DOI:10.1631/jzus.A0820362
3Consistency maintenance for constraint in role-based access control model
Author(s):HAN Wei-li, CHEN Gang, YIN Jian-wei, DONG Jin-xiang  Clicked:4868  Download:2601  Cited:0  <Full Text>
Journal of Zhejiang University Science  2002 Vol.3 No.3 P.292-297  DOI:10.1631/jzus.2002.0292
4Minimal role mining method for Web service composition
Author(s):Chao Huang, Jian-ling Sun, Xin-yu Wang, Yuan-jie Si  Clicked:7685  Download:2851  Cited:4  <Full Text>
Journal of Zhejiang University Science C  2010 Vol.11 No.5 P.328-339  DOI:10.1631/jzus.C0910186
5A fine-grained access control model for relational databases
Author(s):Jie Shi, Hong Zhu  Clicked:7347  Download:3425  Cited:6  <Full Text>
Journal of Zhejiang University Science C  2010 Vol.11 No.8 P.575-586  DOI:10.1631/jzus.C0910466
6An authorization model for collaborative access control
Author(s):Chen-hua Ma, Guo-dong Lu, Jiong Qiu  Clicked:6896  Download:2559  Cited:3  <Full Text>
Journal of Zhejiang University Science C  2010 Vol.11 No.9 P.699-717  DOI:10.1631/jzus.C0910564
7Funneling media access control (MAC) protocol for underwater acoustic sensor networks
Author(s):Guang-yu Fan, Hui-fang Chen, Lei Xie, Kuang Wang  Clicked:8261  Download:3559  Cited:2  <Full Text>
Journal of Zhejiang University Science C  2011 Vol.12 No.11 P.932-941  DOI:10.1631/jzus.C1000388
8Efficient revocation in ciphertext-policy attribute-based encryption based cryptographic cloud storage
Author(s):Yong Cheng, Zhi-ying Wang, Jun Ma, Jiang-jiang Wu, Song-zhu Mei, Jiang-chun Ren  Clicked:9970  Download:8210  Cited:14  <Full Text>
Journal of Zhejiang University Science C  2013 Vol.14 No.2 P.85-97  DOI:10.1631/jzus.C1200240
9A slotted floor acquisition multiple access based MAC protocol for underwater acoustic networks with RTS competition
Author(s):Liang-fang Qian, Sen-lin Zhang, Mei-qin Liu  Clicked:8513  Download:3087  Cited:4  <Full Text>  <PPT> 2392
Frontiers of Information Technology & Electronic Engineering  2015 Vol.16 No.3 P.217-226  DOI:10.1631/FITEE.1400187
10Generic user revocation systems for attribute-based encryption in cloud storage
Author(s):Genlang Chen, Zhiqian Xu, Hai Jiang, Kuan-ching Li  Clicked:5348  Download:2145  Cited:0  <Full Text>  <PPT> 1696
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.11 P.1362-1384  DOI:10.1631/FITEE.1800405
11Generic attribute revocation systems for attribute-based encryption in cloud storage
Author(s):Genlang Chen, Zhiqian Xu, Jia-jian Zhang, Guo-jun Wang, Hai Jiang, Miao-qing Huang  Clicked:5510  Download:1788  Cited:0  <Full Text>  <PPT> 1543
Frontiers of Information Technology & Electronic Engineering  2019 Vol.20 No.6 P.773-786  DOI:10.1631/FITEE.1800512
12RCDS: a right-confirmable data-sharing model based on symbol mapping coding and blockchain
Author(s):Liang WANG, Shunjiu HUANG, Lina ZUO, Jun LI, Wenyuan LIU  Clicked:1514  Download:2757  Cited:0  <Full Text>  <PPT> 207
Frontiers of Information Technology & Electronic Engineering  2023 Vol.24 No.8 P.1194-1213  DOI:10.1631/FITEE.2200659
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2024 Journal of Zhejiang University-SCIENCE