Advanced Search



153 results found in all.
index Title
31Building a highly available and intrusion tolerant database security and protection system (DSPS)
Author(s):CAI Liang, YANG Xiao-hu, DONG Jin-xiang  Clicked:4059  Download:2372  Cited:0  <Full Text>
Journal of Zhejiang University Science  2003 Vol.4 No.3 P.287-293  DOI:10.1631/jzus.2003.0287
32Distributed heterogeneous inspecting system and its middleware-based solution
Author(s):HUANG Li-can, WU Zhao-hui, PAN Yun-he  Clicked:4977  Download:2394  Cited:0  <Full Text>
Journal of Zhejiang University Science  2003 Vol.4 No.5 P.542-548  DOI:10.1631/jzus.2003.0542
33A MUTUAL NON-REPUDIATION PROTOCOL WITH PRIVACY
Author(s):JIANG Xiao-ning, YE Cheng-qing  Clicked:4396  Download:2409  Cited:0  <Full Text>
Journal of Zhejiang University Science  2000 Vol.1 No.3 P.317-321  DOI:10.1631/jzus.2000.0317
34A novel multisignature scheme for a special verifier group against clerk and rogue-key attacks
Author(s):Jia-lun Tsai, Tzong-chen Wu, Kuo-yu Tsai  Clicked:7896  Download:3042  Cited:1  <Full Text>
Journal of Zhejiang University Science C  2010 Vol.11 No.4 P.290-295  DOI:10.1631/jzus.C0910457
35Untraceable partially blind signature based on DLOG problem
Author(s):HUANG Zheng, CHEN Ke-fei, KOU Wei-dong  Clicked:4722  Download:2371  Cited:3  <Full Text>
Journal of Zhejiang University Science  2004 Vol.5 No.1 P.40-44  DOI:10.1631/jzus.2004.0040
36Verifiable threshold signature schemes against conspiracy attack
Author(s):GAN Yuan-ju  Clicked:4694  Download:2629  Cited:0  <Full Text>
Journal of Zhejiang University Science  2004 Vol.5 No.1 P.50-54  DOI:10.1631/jzus.2004.0050
37A reference model for database security proxy
Author(s):CAI Liang, YANG Xiao-hu, DONG Jin-xiang  Clicked:4275  Download:2327  Cited:0  <Full Text>
Journal of Zhejiang University Science  2002 Vol.3 No.1 P.30-36  DOI:10.1631/jzus.2002.0030
38Estimation of financial loss ratio for E-insurance: a quantitative model
Author(s):ZHONG Yuan-sheng, CHEN De-ren, SHI Min-hua  Clicked:4097  Download:2466  Cited:0  <Full Text>
Journal of Zhejiang University Science  2002 Vol.3 No.2 P.140-147  DOI:10.1631/jzus.2002.0140
39A new asymmetric watermarking scheme based on a real fractional DCT-I transform
Author(s):Gui Guo-fu, Jiang Ling-ge, He Chen  Clicked:5152  Download:2411  Cited:1  <Full Text>
Journal of Zhejiang University Science A  2006 Vol.7 No.3 P.285-288  DOI:10.1631/jzus.2006.A0285
40Minimal role mining method for Web service composition
Author(s):Chao Huang, Jian-ling Sun, Xin-yu Wang, Yuan-jie Si  Clicked:7683  Download:2851  Cited:4  <Full Text>
Journal of Zhejiang University Science C  2010 Vol.11 No.5 P.328-339  DOI:10.1631/jzus.C0910186
41A fine-grained access control model for relational databases
Author(s):Jie Shi, Hong Zhu  Clicked:7345  Download:3425  Cited:6  <Full Text>
Journal of Zhejiang University Science C  2010 Vol.11 No.8 P.575-586  DOI:10.1631/jzus.C0910466
42Quasi-distributed sensing network based on coherence multiplexing and spatial division multiplexing for coal mine security monitoring
Author(s):Tian-hao Xia, Wei-sheng Liu, Bin Zhou, Bo-bo Gu, Chun-sheng Yan  Clicked:8038  Download:2727  Cited:0  <Full Text>
Journal of Zhejiang University Science C  2010 Vol.11 No.10 P.762-766  DOI:10.1631/jzus.C0910716
43A new data normalization method for unsupervised anomaly intrusion detection
Author(s):Long-zheng Cai, Jian Chen, Yun Ke, Tao Chen, Zhi-gang Li  Clicked:7907  Download:3057  Cited:2  <Full Text>
Journal of Zhejiang University Science C  2010 Vol.11 No.10 P.778-784  DOI:10.1631/jzus.C0910625
44Efficient password authentication schemes based on a geometric approach for a multi-server environment
Author(s):Horng-Twu Liaw, Chih-Ta Yen, Meng-Yu Chiu, Li-Lin Hsiao  Clicked:6811  Download:2458  Cited:1  <Full Text>
Journal of Zhejiang University Science C  2010 Vol.11 No.12 P.989-997  DOI:10.1631/jzus.C0910712
45A three-level authenticated conference key establishment protocol for UMTS networks
Author(s):Chung-Fu Lu, Tzong-Chen Wu, Chien-Lung Hsu  Clicked:7086  Download:3134  Cited:1  <Full Text>
Journal of Zhejiang University Science C  2011 Vol.12 No.5 P.371-378  DOI:10.1631/jzus.C1000194
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2024 Journal of Zhejiang University-SCIENCE