Advanced Search



58 results found in all.
index Title
16A fine-grained access control model for relational databases
Author(s):Jie Shi, Hong Zhu  Clicked:7347  Download:3425  Cited:6  <Full Text>
Journal of Zhejiang University Science C  2010 Vol.11 No.8 P.575-586  DOI:10.1631/jzus.C0910466
17A new data normalization method for unsupervised anomaly intrusion detection
Author(s):Long-zheng Cai, Jian Chen, Yun Ke, Tao Chen, Zhi-gang Li  Clicked:7910  Download:3057  Cited:2  <Full Text>
Journal of Zhejiang University Science C  2010 Vol.11 No.10 P.778-784  DOI:10.1631/jzus.C0910625
18Efficient password authentication schemes based on a geometric approach for a multi-server environment
Author(s):Horng-Twu Liaw, Chih-Ta Yen, Meng-Yu Chiu, Li-Lin Hsiao  Clicked:6813  Download:2458  Cited:1  <Full Text>
Journal of Zhejiang University Science C  2010 Vol.11 No.12 P.989-997  DOI:10.1631/jzus.C0910712
19CCA2 secure biometric identity based encryption with constant-size ciphertext
Author(s):Yang Yang, Yu-pu Hu, Le-you Zhang, Chun-hui Sun  Clicked:7913  Download:3419  Cited:1  <Full Text>
Journal of Zhejiang University Science C  2011 Vol.12 No.10 P.819-827  DOI:10.1631/jzus.C1000429
20A 10 Gbps in-line network security processor based on configurable hetero-multi-cores
Author(s):Yun Niu, Li-ji Wu, Yang Liu, Xiang-min Zhang, Hong-yi Chen  Clicked:7524  Download:3441  Cited:2  <Full Text>  <PPT> 2352
Journal of Zhejiang University Science C  2013 Vol.14 No.8 P.642-651  DOI:10.1631/jzus.C1200370
21Analysis and design of a smart card based authentication protocol
Author(s):Kuo-Hui Yeh, Kuo-Yu Tsai, Jia-Li Hou  Clicked:7608  Download:3006  Cited:0  <Full Text>  <PPT> 1773
Journal of Zhejiang University Science C  2013 Vol.14 No.12 P.909-917  DOI:10.1631/jzus.C1300158
22Botnet detection techniques: review, future trends, and issues
Author(s):Ahmad Karim, Rosli Bin Salleh, Muhammad Shiraz, Syed Adeel Ali Shah, Irfan Awan, Nor Badrul Anuar  Clicked:18080  Download:17380  Cited:10  <Full Text>  <PPT> 2571
Journal of Zhejiang University Science C  2014 Vol.15 No.11 P.943-983  DOI:10.1631/jzus.C1300242
23ImgFS: a transparent cryptography for stored images using a filesystem in userspace
Author(s):Osama A. Khashan, Abdullah M. Zin, Elankovan A. Sundararajan  Clicked:5901  Download:2521  Cited:0  <Full Text>  <PPT> 2101
Frontiers of Information Technology & Electronic Engineering  2015 Vol.16 No.1 P.28-42  DOI:10.1631/FITEE.1400133
24Moving target defense: state of the art and characteristics
Author(s):Gui-lin CAI, Bao-sheng WANG, Wei HU, Tian-zuo WANG  Clicked:5724  Download:3372  Cited:1  <Full Text>  <PPT> 1723
Frontiers of Information Technology & Electronic Engineering  2016 Vol.17 No.11 P.1122-1153  DOI:10.1631/FITEE.1601321
25A lightweight authentication scheme with user untraceability
Author(s):Kuo-Hui Yeh  Clicked:6676  Download:2682  Cited:2  <Full Text>  <PPT> 1886
Frontiers of Information Technology & Electronic Engineering  2015 Vol.16 No.4 P.259-271  DOI:10.1631/FITEE.1400232
26Low-computation certificateless hybrid signcryption scheme
Author(s):Hui-fang Yu, Bo Yang  Clicked:6638  Download:2437  Cited:0  <Full Text>  <PPT> 1714
Frontiers of Information Technology & Electronic Engineering  2017 Vol.18 No.7 P.928-940  DOI:10.1631/FITEE.1601054
27BORON: an ultra-lightweight and low power encryption design for pervasive computing
Author(s):Gaurav Bansod, Narayan Pisharoty, Abhijit Patil  Clicked:6294  Download:4017  Cited:0  <Full Text>
Frontiers of Information Technology & Electronic Engineering  2017 Vol.18 No.3 P.317-331  DOI:10.1631/FITEE.1500415
28Anonymous-address-resolution model
Author(s):Guang-jia Song, Zhen-zhou Ji  Clicked:5848  Download:2171  Cited:0  <Full Text>  <PPT> 1602
Frontiers of Information Technology & Electronic Engineering  2016 Vol.17 No.10 P.1044-1055  DOI:10.1631/FITEE.1500382
29Secrecy performance analysis of single-input multiple-output generalized-K fading channels
Author(s):Hong-jiang Lei, Imran Shafique Ansari, Chao Gao, Yong-cai Guo, Gao-feng Pan, Khalid A. Qaraqe  Clicked:5880  Download:2384  Cited:0  <Full Text>  <PPT> 1671
Frontiers of Information Technology & Electronic Engineering  2016 Vol.17 No.10 P.1074-1084  DOI:10.1631/FITEE.1601070
30Ergodic secrecy capacity of MRC/SC in single-input multiple-output wiretap systems with imperfect channel state information
Author(s):Hui Zhao, You-yu Tan, Gao-feng Pan, Yun-fei Chen  Clicked:6773  Download:2873  Cited:1  <Full Text>  <PPT> 1789
Frontiers of Information Technology & Electronic Engineering  2017 Vol.18 No.4 P.578-590  DOI:10.1631/FITEE.1500430
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2024 Journal of Zhejiang University-SCIENCE