Advanced Search



45 results found in all.
index Title
16Low-computation certificateless hybrid signcryption scheme
Author(s):Hui-fang Yu, Bo Yang  Clicked:6610  Download:2429  Cited:0  <Full Text>  <PPT> 1702
Frontiers of Information Technology & Electronic Engineering  2017 Vol.18 No.7 P.928-940  DOI:10.1631/FITEE.1601054
17BORON: an ultra-lightweight and low power encryption design for pervasive computing
Author(s):Gaurav Bansod, Narayan Pisharoty, Abhijit Patil  Clicked:6272  Download:4010  Cited:0  <Full Text>
Frontiers of Information Technology & Electronic Engineering  2017 Vol.18 No.3 P.317-331  DOI:10.1631/FITEE.1500415
18Efficient hierarchical identity based encryption scheme in the standard model over lattices
Author(s):Feng-he Wang, Chun-xiao Wang, Zhen-hua Liu  Clicked:5914  Download:2357  Cited:0  <Full Text>  <PPT> 1689
Frontiers of Information Technology & Electronic Engineering  2016 Vol.17 No.8 P.781-791  DOI:10.1631/FITEE.1500219
19Chaotic digital cryptosystem using serial peripheral interface protocol and its dsPIC implementation
Author(s):Rodrigo Méndez-Ramírez, Adrian Arellano-Delgado, César Cruz-Hernández, Fausto Abundiz-Pérez, Rigoberto Martínez-Clark  Clicked:7399  Download:3082  Cited:0  <Full Text>  <PPT> 1475
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.2 P.165-179  DOI:10.1631/FITEE.1601346
20Phase problems in optical imaging
Author(s):Guo-hai Situ, Hai-chao Wang  Clicked:5135  Download:1769  Cited:1  <Full Text>
Frontiers of Information Technology & Electronic Engineering  2017 Vol.18 No.9 P.1277-1287  DOI:10.1631/FITEE.1700298
21High-payload completely reversible data hiding in encrypted images by an interpolation technique
Author(s):Di Xiao, Ying Wang, Tao Xiang, Sen Bai  Clicked:6205  Download:2841  Cited:0  <Full Text>  <PPT> 1492
Frontiers of Information Technology & Electronic Engineering  2017 Vol.18 No.11 P.1732-1743  DOI:10.1631/FITEE.1601067
22A leakage-resilient certificateless public key encryption scheme with CCA2 security
Author(s):Yan-wei Zhou, Bo Yang, Hao Cheng, Qing-long Wang  Clicked:5627  Download:2288  Cited:0  <Full Text>  <PPT> 1646
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.4 P.481-493  DOI:10.1631/FITEE.1601849
23Constructing pairing-free certificateless public key encryption with keyword search
Author(s):Yang Lu, Ji-guo Li  Clicked:5252  Download:1938  Cited:0  <Full Text>  <PPT> 1380
Frontiers of Information Technology & Electronic Engineering  2019 Vol.20 No.8 P.1049-1060  DOI:10.1631/FITEE.1700534
24Generic user revocation systems for attribute-based encryption in cloud storage
Author(s):Genlang Chen, Zhiqian Xu, Hai Jiang, Kuan-ching Li  Clicked:5332  Download:2130  Cited:0  <Full Text>  <PPT> 1689
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.11 P.1362-1384  DOI:10.1631/FITEE.1800405
25Survey of design and security evaluation of authenticated encryption algorithms in the CAESAR competition
Author(s):Fan Zhang, Zi-yuan Liang, Bo-lin Yang, Xin-jie Zhao, Shi-ze Guo, Kui Ren  Clicked:4896  Download:2976  Cited:0  <Full Text>  <PPT> 1364
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.12 P.1475-1499  DOI:10.1631/FITEE.1800576
26Faster fog-aided private set intersection with integrity preserving
Author(s):Qiang Wang, Fu-cai Zhou, Tie-min Ma, Zi-feng Xu  Clicked:4374  Download:1862  Cited:0  <Full Text>  <PPT> 1446
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.12 P.1558-1568  DOI:10.1631/FITEE.1800518
27Security for cyberspace: challenges and opportunities
Author(s):Jiang-xing WU, Jian-hua LI, Xin-sheng JI  Clicked:3090  Download:1642  Cited:0  <Full Text>
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.12 P.1459-1461  DOI:10.1631/FITEE.1840000
28Generic attribute revocation systems for attribute-based encryption in cloud storage
Author(s):Genlang Chen, Zhiqian Xu, Jia-jian Zhang, Guo-jun Wang, Hai Jiang, Miao-qing Huang  Clicked:5492  Download:1780  Cited:0  <Full Text>  <PPT> 1537
Frontiers of Information Technology & Electronic Engineering  2019 Vol.20 No.6 P.773-786  DOI:10.1631/FITEE.1800512
29Nanoscale cryptographic architecture design using quantum-dot cellular automata
Author(s):Bikash Debnath, Jadav Chandra Das, Debashis De  Clicked:4983  Download:2598  Cited:0  <Full Text>
Frontiers of Information Technology & Electronic Engineering  2019 Vol.20 No.11 P.1578-1586  DOI:10.1631/FITEE.1800458
30Design and implementation of various datapath architectures for the ANU lightweight cipher on an FPGA
Author(s):Vijay Dahiphale, Gaurav Bansod, Ankur Zambare, Narayan Pisharoty  Clicked:5418  Download:2392  Cited:0  <Full Text>  <PPT> 1416
Frontiers of Information Technology & Electronic Engineering  2020 Vol.21 No.4 P.615-628  DOI:10.1631/FITEE.1800681
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2024 Journal of Zhejiang University-SCIENCE