Advanced Search



58 results found in all.
index Title
31A keyed-hashing based self-synchronization mechanism for port address hopping communication
Author(s):Yue-bin Luo, Bao-sheng Wang, Xiao-feng Wang, Bo-feng Zhang  Clicked:6456  Download:2159  Cited:0  <Full Text>  <PPT> 1764
Frontiers of Information Technology & Electronic Engineering  2017 Vol.18 No.5 P.719-728  DOI:10.1631/FITEE.1601548
32Scientific workflow execution system based on mimic defense in the cloud environment
Author(s):Ya-wen Wang, Jiang-xing Wu, Yun-fei Guo, Hong-chao Hu, Wen-yan Liu, Guo-zhen Cheng  Clicked:5131  Download:1895  Cited:0  <Full Text>  <PPT> 1543
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.12 P.1522-1536  DOI:10.1631/FITEE.1800621
33A secure and high-performance multi-controller architecture for software-defined networking
Author(s):Huan-zhao Wang, Peng Zhang, Lei Xiong, Xin Liu, Cheng-chen Hu  Clicked:5803  Download:2853  Cited:2  <Full Text>  <PPT> 1604
Frontiers of Information Technology & Electronic Engineering  2016 Vol.17 No.7 P.634-646  DOI:10.1631/FITEE.1500321
34Correlated channel model-based secure communications in dual-hop wireless communication networks
Author(s):Zhen-hua Yuan, Chen Chen, Xiang Cheng, Guo-cheng Lv, Liu-qing Yang, Ye Jin  Clicked:6309  Download:2007  Cited:1  <Full Text>
Frontiers of Information Technology & Electronic Engineering  2017 Vol.18 No.6 P.796-807  DOI:10.1631/FITEE.1700023
35Joint cooperative beamforming and artificial noise design for secure AF relay networks with energy-harvesting eavesdroppers
Author(s):He-hao Niu, Bang-ning Zhang, Dao-xing Guo, Yu-zhen Huang, Ming-yue Lu  Clicked:5834  Download:2178  Cited:1  <Full Text>  <PPT> 1719
Frontiers of Information Technology & Electronic Engineering  2017 Vol.18 No.6 P.850-862  DOI:10.1631/FITEE.1601832
36Game theoretic analysis for the mechanism of moving target defense
Author(s):Gui-lin Cai, Bao-sheng Wang, Qian-qian Xing  Clicked:5936  Download:1990  Cited:0  <Full Text>  <PPT> 1664
Frontiers of Information Technology & Electronic Engineering  2017 Vol.18 No.12 P.2017-2034  DOI:10.1631/FITEE.1601797
37Resource allocation for physical-layer security in OFDMA downlink with imperfect CSI
Author(s):Wei Yang, Jing Mao, Chen Chen, Xiang Cheng, Liu-qing Yang, Hai-ge Xiang  Clicked:6298  Download:2356  Cited:0  <Full Text>  <PPT> 1694
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.3 P.398-408  DOI:10.1631/FITEE.1700026
38Preserving privacy information flow security in composite service evolution
Author(s):Huan-feng Peng, Zhi-qiu Huang, Lin-yuan Liu, Yong Li, Da-juan Fan, Yu-qing Wang  Clicked:5370  Download:1861  Cited:0  <Full Text>  <PPT> 1514
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.5 P.626-638  DOI:10.1631/FITEE.1700359
39On the role of optimization algorithms in ownership-preserving data mining
Author(s):Muhammad Kamran, Ehsan Ullah Munir  Clicked:6430  Download:1945  Cited:0  <Full Text>  <PPT> 1361
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.2 P.151-164  DOI:10.1631/FITEE.1601479
40A leakage-resilient certificateless public key encryption scheme with CCA2 security
Author(s):Yan-wei Zhou, Bo Yang, Hao Cheng, Qing-long Wang  Clicked:5664  Download:2297  Cited:0  <Full Text>  <PPT> 1650
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.4 P.481-493  DOI:10.1631/FITEE.1601849
41Stochastic stability analysis of networked control systems with random cryptographic protection under random zero-measurement attacks
Author(s):Meng-zhou Gao, Dong-qin Feng  Clicked:7839  Download:2408  Cited:0  <Full Text>  <PPT> 1732
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.9 P.1098-1111  DOI:10.1631/FITEE.1700334
42Cyber security meets artificial intelligence: a survey
Author(s):Jian-hua Li  Clicked:6223  Download:2412  Cited:0  <Full Text>  <PPT> 1682
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.12 P.1462-1474  DOI:10.1631/FITEE.1800573
43Novel architectures and security solutions of programmable software-defined networking: a comprehensive survey
Author(s):Shen Wang, Jun Wu, Wu Yang, Long-hua Guo  Clicked:4512  Download:1556  Cited:0  <Full Text>  <PPT> 1398
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.12 P.1500-1521  DOI:10.1631/FITEE.1800575
44Survey of design and security evaluation of authenticated encryption algorithms in the CAESAR competition
Author(s):Fan Zhang, Zi-yuan Liang, Bo-lin Yang, Xin-jie Zhao, Shi-ze Guo, Kui Ren  Clicked:4922  Download:3002  Cited:0  <Full Text>  <PPT> 1369
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.12 P.1475-1499  DOI:10.1631/FITEE.1800576
45Double-authentication-preventing signatures revisited: new definition and construction from chameleon hash
Author(s):Fei Li, Wei Gao, Gui-lin Wang, Ke-fei Chen, Chun-ming Tang  Clicked:7106  Download:2441  Cited:0  <Full Text>  <PPT> 1506
Frontiers of Information Technology & Electronic Engineering  2019 Vol.20 No.2 P.176-186  DOI:10.1631/FITEE.1700005
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2024 Journal of Zhejiang University-SCIENCE