Advanced Search



16 results found in all.
index Title
1Optimizing storage performance in public cloud platforms
Author(s):Jian-zong Wang, Peter Varman, Chang-sheng Xie  Clicked:9159  Download:4381  Cited:6  <Full Text>
Journal of Zhejiang University Science C  2011 Vol.12 No.12 P.951-964  DOI:10.1631/jzus.C1100097
2Efficient revocation in ciphertext-policy attribute-based encryption based cryptographic cloud storage
Author(s):Yong Cheng, Zhi-ying Wang, Jun Ma, Jiang-jiang Wu, Song-zhu Mei, Jiang-chun Ren  Clicked:9968  Download:8210  Cited:14  <Full Text>
Journal of Zhejiang University Science C  2013 Vol.14 No.2 P.85-97  DOI:10.1631/jzus.C1200240
3NaEPASC: a novel and efficient public auditing scheme for cloud data
Author(s):Shuang Tan, Yan Jia  Clicked:9416  Download:4436  Cited:7  <Full Text>  <PPT> 2041
Journal of Zhejiang University Science C  2014 Vol.15 No.9 P.794-804  DOI:10.1631/jzus.C1400045
4Analyzing the service availability of mobile cloud computing systems by fluid-flow approximation
Author(s):Hong-wu Lv, Jun-yu Lin, Hui-qiang Wang, Guang-sheng Feng, Mo Zhou  Clicked:6546  Download:2354  Cited:2  <Full Text>  <PPT> 1952
Frontiers of Information Technology & Electronic Engineering  2015 Vol.16 No.7 P.553-567  DOI:10.1631/FITEE.1400410
5Cryptanalysis of an identity-based public auditing protocol for cloud storage
Author(s):Li-bing Wu, Jing Wang, De-biao He, Muhammad-Khurram Khan  Clicked:6917  Download:2276  Cited:0  <Full Text>  <PPT> 1820
Frontiers of Information Technology & Electronic Engineering  2017 Vol.18 No.12 P.1972-1977  DOI:10.1631/FITEE.1601530
6Post-exascale supercomputing: research opportunities abound
Author(s):Zuo-ning Chen, Jack Dongarra, Zhi-wei Xu  Clicked:4102  Download:2263  Cited:0  <Full Text>
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.10 P.1203-1208  DOI:10.1631/FITEE.1830000
7Generic user revocation systems for attribute-based encryption in cloud storage
Author(s):Genlang Chen, Zhiqian Xu, Hai Jiang, Kuan-ching Li  Clicked:5346  Download:2145  Cited:0  <Full Text>  <PPT> 1696
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.11 P.1362-1384  DOI:10.1631/FITEE.1800405
8A secure data sharing scheme with cheating detection based on Chaum-Pedersen protocol for cloud storage
Author(s):Xin Wang, Bo Yang, Zhe Xia, Hong-xia Hou  Clicked:6987  Download:1928  Cited:0  <Full Text>  <PPT> 1638
Frontiers of Information Technology & Electronic Engineering  2019 Vol.20 No.6 P.787-800  DOI:10.1631/FITEE.1800066
9Generic attribute revocation systems for attribute-based encryption in cloud storage
Author(s):Genlang Chen, Zhiqian Xu, Jia-jian Zhang, Guo-jun Wang, Hai Jiang, Miao-qing Huang  Clicked:5508  Download:1788  Cited:0  <Full Text>  <PPT> 1543
Frontiers of Information Technology & Electronic Engineering  2019 Vol.20 No.6 P.773-786  DOI:10.1631/FITEE.1800512
10MULKASE: a novel approach for key-aggregate searchable encryption for multi-owner data
Author(s):Mukti Padhya, Devesh C. Jinwala  Clicked:5806  Download:2753  Cited:0  <Full Text>  <PPT> 1385
Frontiers of Information Technology & Electronic Engineering  2019 Vol.20 No.12 P.1717-1748  DOI:10.1631/FITEE.1800192
11MEACC: an energy-efficient framework for smart devices using cloud computing systems
Author(s):Khalid Alsubhi, Zuhaib Imtiaz, Ayesha Raana, M. Usman Ashraf, Babur Hayat  Clicked:5456  Download:3627  Cited:0  <Full Text>  <PPT> 1535
Frontiers of Information Technology & Electronic Engineering  2020 Vol.21 No.6 P.917-930  DOI:10.1631/FITEE.1900198
12A power resource dispatching framework with a privacy protection function in the Power Internet of Things
Author(s):Shuanggen LIU, Shuangzi ZHENG, Wenbo ZHANG, Runsheng FU  Clicked:1754  Download:1924  Cited:0  <Full Text>  <PPT> 327
Frontiers of Information Technology & Electronic Engineering  2022 Vol.23 No.9 P.1354-1368  DOI:10.1631/FITEE.2100518
13Public key based bidirectional shadow image authentication without pixel expansion in image secret sharing
Author(s):Xuehu YAN, Longlong LI, Jia CHEN, Lei SUN  Clicked:1353  Download:3197  Cited:0  <Full Text>  <PPT> 287
Frontiers of Information Technology & Electronic Engineering  2023 Vol.24 No.1 P.88-103  DOI:10.1631/FITEE.2200118
14NEHASH: high-concurrency extendible hashing for non-volatile memory
Author(s):Tao CAI, Pengfei GAO, Dejiao NIU, Yueming MA, Tianle LEI, Jianfei DAI  Clicked:1073  Download:1408  Cited:0  <Full Text>  <PPT> 212
Frontiers of Information Technology & Electronic Engineering  2023 Vol.24 No.5 P.703-715  DOI:10.1631/FITEE.2200462
15Design and application of new storage systems
Author(s):Guangyan ZHANG, Dan FENG, Keqin LI, Zili SHAO, Nong XIAO, Jin XIONG, Weimin ZHENG  Clicked:813  Download:1069  Cited:0  <Full Text>
Frontiers of Information Technology & Electronic Engineering  2023 Vol.24 No.5 P.633-636  DOI:10.1631/FITEE.2310000
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2024 Journal of Zhejiang University-SCIENCE