
| index | Title |
| 1 | Robust lossless data hiding scheme Author(s):Xian-ting ZENG, Xue-zeng PAN, Ling... Clicked:12065 Download:8475 Cited:3 <Full Text> Journal of Zhejiang University Science C 2010 Vol.11 No.2 P.101-110 DOI:10.1631/jzus.C0910177 |
| 2 | A lightweight authentication scheme with user untraceability Author(s):Kuo-Hui Yeh Clicked:10770 Download:4760 Cited:2 <Full Text> <PPT> 2962 Frontiers of Information Technology & Electronic Engineering 2015 Vol.16 No.4 P.259-271 DOI:10.1631/FITEE.1400232 |
| 3 | Secure connectivity analysis in unmanned aerial vehicle networks Author(s):Xin Yuan, Zhi-yong Feng, Wen-jun X... Clicked:9570 Download:4564 Cited:0 <Full Text> <PPT> 2675 Frontiers of Information Technology & Electronic Engineering 2018 Vol.19 No.3 P.409-422 DOI:10.1631/FITEE.1700032 |
| 4 | Enhancing security of NVM-based main memory with dynamic Feistel network mapping Author(s):Fang-ting Huang, Dan Feng, Wen Xia... Clicked:10102 Download:4931 Cited:0 <Full Text> <PPT> 2753 Frontiers of Information Technology & Electronic Engineering 2018 Vol.19 No.7 P.847-863 DOI:10.1631/FITEE.1601652 |
| 5 | An improved Merkle hash tree based secure scheme for bionic underwater acoustic communication Author(s):Masoud Kaveh, Abolfazl Falahati Clicked:7668 Download:13772 Cited:0 <Full Text> Frontiers of Information Technology & Electronic Engineering 2021 Vol.22 No.7 P.1010-1019 DOI:10.1631/FITEE.2000043 |
| 6 | Towards resilient average consensus inmulti-agent systems: a detection and compensation approach Author(s):Chongrong FANG, Wenzhe ZHENG, Zhiy... Clicked:4162 Download:5198 Cited:0 <Full Text> <PPT> 993 Frontiers of Information Technology & Electronic Engineering 2024 Vol.25 No.2 P.182-196 DOI:10.1631/FITEE.2300467 |