
| index | Title |
| 1 | An application-layer based centralized information access control for VPN Author(s):Ouyang Kai, Zhou Jing-li, Xia Tao,... Clicked:8351 Download:3918 Cited:0 <Full Text> Journal of Zhejiang University Science A 2006 Vol.7 No.2 P.240-249 DOI:10.1631/jzus.2006.A0240 |
| 2 | A practical and dynamic key management scheme for a user hierarchy Author(s):Jeng Fuh-gwo, Wang Chung-ming Clicked:7458 Download:3465 Cited:1 <Full Text> Journal of Zhejiang University Science A 2006 Vol.7 No.3 P.296-301 DOI:10.1631/jzus.2006.A0296 |
| 3 | Network-adaptive HD MPEG-2 video streaming with cross-layered channel monitoring in WLAN Author(s):Park Sanghoon, Yoon Hayoung, Kim J... Clicked:7516 Download:3901 Cited:9 <Full Text> Journal of Zhejiang University Science A 2006 Vol.7 No.5 P.885-893 DOI:10.1631/jzus.2006.A0885 |
| 4 | A cross-layer design approach on spectrum allocation and resource scheduling in cognitive PMP networks Author(s):Jie CHEN, Min-jian ZHAO, Qiao ZHOU... Clicked:8237 Download:4294 Cited:0 <Full Text> Journal of Zhejiang University Science A 2008 Vol.9 No.4 P.435-444 DOI:10.1631/jzus.A071373 |
| 5 | A cross-layer approach to enable multipacket transmission in MIMO-SDMA based WLAN Author(s):Sheng-bo CHEN, Wei CHEN, Wei-lan H... Clicked:9096 Download:4377 Cited:1 <Full Text> Journal of Zhejiang University Science A 2009 Vol.10 No.2 P.271-278 DOI:10.1631/jzus.A0820362 |
| 6 | Conflict detection and resolution for authorization policies in workflow systems Author(s):Chen-hua MA, Guo-dong LU, Jiong QIU Clicked:7308 Download:3836 Cited:4 <Full Text> Journal of Zhejiang University Science A 2009 Vol.10 No.8 P.1082-1092 DOI:10.1631/jzus.A0820366 |
| 7 | Consistency maintenance for constraint in role-based access control model Author(s):HAN Wei-li, CHEN Gang, YIN Jian-we... Clicked:6449 Download:3288 Cited:0 <Full Text> Journal of Zhejiang University Science 2002 Vol.3 No.3 P.292-297 DOI:10.1631/jzus.2002.0292 |
| 8 | Minimal role mining method for Web service composition Author(s):Chao Huang, Jian-ling Sun, Xin-yu ... Clicked:10077 Download:3889 Cited:4 <Full Text> Journal of Zhejiang University Science C 2010 Vol.11 No.5 P.328-339 DOI:10.1631/jzus.C0910186 |
| 9 | A fine-grained access control model for relational databases Author(s):Jie Shi, Hong Zhu Clicked:10062 Download:4318 Cited:6 <Full Text> Journal of Zhejiang University Science C 2010 Vol.11 No.8 P.575-586 DOI:10.1631/jzus.C0910466 |
| 10 | An authorization model for collaborative access control Author(s):Chen-hua Ma, Guo-dong Lu, Jiong Qiu Clicked:9156 Download:3597 Cited:3 <Full Text> Journal of Zhejiang University Science C 2010 Vol.11 No.9 P.699-717 DOI:10.1631/jzus.C0910564 |
| 11 | Funneling media access control (MAC) protocol for underwater acoustic sensor networks Author(s):Guang-yu Fan, Hui-fang Chen, Lei X... Clicked:10776 Download:4533 Cited:2 <Full Text> Journal of Zhejiang University Science C 2011 Vol.12 No.11 P.932-941 DOI:10.1631/jzus.C1000388 |
| 12 | Efficient revocation in ciphertext-policy attribute-based encryption based cryptographic cloud storage Author(s):Yong Cheng, Zhi-ying Wang, Jun Ma,... Clicked:12833 Download:10113 Cited:14 <Full Text> Journal of Zhejiang University Science C 2013 Vol.14 No.2 P.85-97 DOI:10.1631/jzus.C1200240 |
| 13 | Reliable beacon transmission based MAC protocol for LR-WPANs over WLAN interferences Author(s):Ji-Hoon Park, Byung-Seo Kim Clicked:10285 Download:4771 Cited:2 <Full Text> <PPT> 2829 Journal of Zhejiang University Science C 2014 Vol.15 No.6 P.470-481 DOI:10.1631/jzus.C1300269 |
| 14 | A slotted floor acquisition multiple access based MAC protocol for underwater acoustic networks with RTS co... Author(s):Liang-fang Qian, Sen-lin Zhang, Me... Clicked:11260 Download:5177 Cited:4 <Full Text> <PPT> 3356 Frontiers of Information Technology & Electronic Engineering 2015 Vol.16 No.3 P.217-226 DOI:10.1631/FITEE.1400187 |
| 15 | Anonymous-address-resolution model Author(s):Guang-jia Song, Zhen-zhou Ji Clicked:9181 Download:4963 Cited:0 <Full Text> <PPT> 2693 Frontiers of Information Technology & Electronic Engineering 2016 Vol.17 No.10 P.1044-1055 DOI:10.1631/FITEE.1500382 |