Journal of Zhejiang University


  

Advanced Search



45 results found in all.
index Title
31MULKASE: a novel approach for key-aggregate searchable encryption for multi-owner data
Author(s):Mukti Padhya, Devesh C. Jinwala  Clicked:5783  Download:2748  Cited:0  <Full Text>  <PPT> 1382
Frontiers of Information Technology & Electronic Engineering  2019 Vol.20 No.12 P.1717-1748  DOI:10.1631/FITEE.1800192
32Dynamic analysis, FPGA implementation, and cryptographic application of an autonomous 5D chaotic system with offset boosting
Author(s):Sifeu Takougang Kingni, Karthikeyan Rajagopal, Serdar Çiçek, Ashokkumar Srinivasan, Anitha Karthikeyan  Clicked:5919  Download:3414  Cited:0  <Full Text>
Frontiers of Information Technology & Electronic Engineering  2020 Vol.21 No.6 P.950-961  DOI:10.1631/FITEE.1900167
33A novel color image encryption algorithm based on a fractional-order discrete chaotic neural network and DNA sequence operations
Author(s):Li-ping Chen, Hao Yin, Li-guo Yuan, António M. Lopes, J. A. Tenreiro Machado, Ran-chao Wu  Clicked:5448  Download:2952  Cited:0  <Full Text>  <PPT> 1501
Frontiers of Information Technology & Electronic Engineering  2020 Vol.21 No.6 P.866-879  DOI:10.1631/FITEE.1900709
34Discrete fractional watermark technique
Author(s):Zai-rong Wang, Babak Shiri, Dumitru Baleanu  Clicked:4454  Download:2115  Cited:0  <Full Text>  <PPT> 1397
Frontiers of Information Technology & Electronic Engineering  2020 Vol.21 No.6 P.880-883  DOI:10.1631/FITEE.2000133
35Bio-inspired cryptosystem on the reciprocal domain: DNA strands mutate to secure health data
Author(s):S. Aashiq Banu, Rengarajan Amirtharajan  Clicked:5047  Download:3342  Cited:0  <Full Text>  <PPT> 1609
Frontiers of Information Technology & Electronic Engineering  2021 Vol.22 No.7 P.940-956  DOI:10.1631/FITEE.2000071
36Identity-based threshold proxy re-encryption scheme from lattices and its applications
Author(s):Liqiang WU, Yiliang HAN, Xiaoyuan YANG, Minqing ZHANG  Clicked:5799  Download:4660  Cited:0  <Full Text>  <PPT> 483
Frontiers of Information Technology & Electronic Engineering  2022 Vol.23 No.2 P.258-277  DOI:10.1631/FITEE.2000366
37Verifier-local revocation group signatures with backward unlinkability from lattices
Author(s):Yanhua ZHANG, Ximeng LIU, Yupu HU, Yong GAN, Huiwen JIA  Clicked:5465  Download:4135  Cited:0  <Full Text>  <PPT> 272
Frontiers of Information Technology & Electronic Engineering  2022 Vol.23 No.6 P.876-892  DOI:10.1631/FITEE.2000507
38An energy-efficient reconfigurable asymmetric modular cryptographic operation unit for RSA and ECC
Author(s):Mengni BIE, Wei LI, Tao CHEN, Longmei NAN, Danyang YANG  Clicked:5556  Download:3878  Cited:0  <Full Text>  <PPT> 627
Frontiers of Information Technology & Electronic Engineering  2022 Vol.23 No.1 P.134-144  DOI:10.1631/FITEE.2000325
39A joint image compression and encryption scheme based on a novel coupled map lattice system and DNA operations
Author(s):Yuanyuan LI, Xiaoqing YOU, Jianquan LU, Jungang LOU  Clicked:848  Download:1097  Cited:0  <Full Text>  <PPT> 175
Frontiers of Information Technology & Electronic Engineering  2023 Vol.24 No.6 P.813-827  DOI:10.1631/FITEE.2200645
40A novel hybrid cryptosystem based on DQFrFT watermarking and 3D-CLM encryption for healthcare services
Author(s):Fatma KHALLAF, Walid EL-SHAFAI, El-Sayed M. EL-RABAIE, Naglaa F. SOLIMAN, Fathi E. Abd EL-SAMIE  Clicked:1150  Download:1117  Cited:0  <Full Text>  <PPT> 245
Frontiers of Information Technology & Electronic Engineering  2023 Vol.24 No.7 P.1045-1061  DOI:10.1631/FITEE.2200372
41TPE-H2MWD: an exact thumbnail preserving encryption scheme with hidden Markov model and weighted diffusion
Author(s):Xiuli CHAI, Xiuhui CHEN, Yakun MA, Fang ZUO, Zhihua GAN, Yushu ZHANG  Clicked:992  Download:741  Cited:0  <Full Text>  <PPT> 173
Frontiers of Information Technology & Electronic Engineering  2023 Vol.24 No.8 P.1169-1180  DOI:10.1631/FITEE.2200498
42Reinforcement learning-based privacy-preserving consensus tracking control of nonstrict-feedback discrete-time multi-agent systems
Author(s):Yang YANG, Fanming HUANG, Dong YUE  Clicked:183  Download:90  Cited:0  <Full Text>
Frontiers of Information Technology & Electronic Engineering  In Press    DOI:
43Reversible data hiding scheme for encrypted JPEG bitstreams using adaptive RZLs rotation*#
Author(s):Yongning GUO, Guodong SU, Zhiqiang YAO, Wang ZHOU  Clicked:151  Download:90  Cited:0  <Full Text>
Frontiers of Information Technology & Electronic Engineering  In Press    DOI:
44A reversible data hiding in encrypted image based on additive secret sharing and adaptive joint coding using an intelligent predictor
Author(s):Ziyi ZHOU, Chengyue WANG, Kexun YAN, Hui SHI, Xin PANG  Clicked:135  Download:119  Cited:0  <Full Text>
Frontiers of Information Technology & Electronic Engineering  In Press    DOI:
45A geographic information encryption system based on chaos-LSTM and chaos sequence proliferation
Author(s):Jia DUAN, Luanyun HU, Qiumei XIAO, Meiting LIU, Wenxin YU  Clicked:33  Download:21  Cited:0  <Full Text>
Frontiers of Information Technology & Electronic Engineering  In Press    DOI:
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2024 Journal of Zhejiang University-SCIENCE