
| index | Title |
| 1 | Improvement of Laih and Yen's multisignature scheme Author(s):XIE Qi, YU Xiu-yuan Clicked:11478 Download:3854 Cited:3 <Full Text> Journal of Zhejiang University Science 2004 Vol.5 No.9 P.1155-1159 DOI:10.1631/jzus.2004.1155 |
| 2 | A novel mutual authentication and key agreement protocol based on NTRU cryptography for wireless communicat... Author(s):JIANG Jun, HE Chen Clicked:8387 Download:4675 Cited:1 <Full Text> Journal of Zhejiang University Science A 2005 Vol.6 No.5 P.399-404 DOI:10.1631/jzus.2005.A0399 |
| 3 | A practical and dynamic key management scheme for a user hierarchy Author(s):Jeng Fuh-gwo, Wang Chung-ming Clicked:7458 Download:3464 Cited:1 <Full Text> Journal of Zhejiang University Science A 2006 Vol.7 No.3 P.296-301 DOI:10.1631/jzus.2006.A0296 |
| 4 | Self-certified multi-proxy signature schemes with message recovery Author(s):Tzong-sun WU, Chien-lung HSU, Han-... Clicked:7611 Download:4387 Cited:8 <Full Text> Journal of Zhejiang University Science A 2009 Vol.10 No.2 P.290-300 DOI:10.1631/jzus.A0820202 |
| 5 | A secure threshold Paillier proxy signature scheme Author(s):Pei-yih TING, Xiao-wei HUANG, Jun-... Clicked:10613 Download:4867 Cited:1 <Full Text> Journal of Zhejiang University Science C 2010 Vol.11 No.3 P.206-213 DOI:10.1631/jzus.C0910493 |
| 6 | A novel multisignature scheme for a special verifier group against clerk and rogue-key attacks Author(s):Jia-lun Tsai, Tzong-chen Wu, Kuo-y... Clicked:10181 Download:3908 Cited:1 <Full Text> Journal of Zhejiang University Science C 2010 Vol.11 No.4 P.290-295 DOI:10.1631/jzus.C0910457 |
| 7 | A novel group signature with one time secret key Author(s):XIE Qi, YU Xiu-yuan Clicked:7447 Download:3613 Cited:0 <Full Text> Journal of Zhejiang University Science A 2005 Vol.6 No.6 P.560-564 DOI:10.1631/jzus.2005.A0560 |
| 8 | CCA2 secure biometric identity based encryption with constant-size ciphertext Author(s):Yang Yang, Yu-pu Hu, Le-you Zhang,... Clicked:10496 Download:4601 Cited:1 <Full Text> Journal of Zhejiang University Science C 2011 Vol.12 No.10 P.819-827 DOI:10.1631/jzus.C1000429 |
| 9 | NaEPASC: a novel and efficient public auditing scheme for cloud data Author(s):Shuang Tan, Yan Jia Clicked:12633 Download:9436 Cited:7 <Full Text> <PPT> 3108 Journal of Zhejiang University Science C 2014 Vol.15 No.9 P.794-804 DOI:10.1631/jzus.C1400045 |
| 10 | Efficient hierarchical identity based encryption scheme in the standard model over lattices Author(s):Feng-he Wang, Chun-xiao Wang, Zhen... Clicked:9537 Download:4624 Cited:0 <Full Text> <PPT> 2563 Frontiers of Information Technology & Electronic Engineering 2016 Vol.17 No.8 P.781-791 DOI:10.1631/FITEE.1500219 |
| 11 | A leakage-resilient certificateless public key encryption scheme with CCA2 security Author(s):Yan-wei Zhou, Bo Yang, Hao Cheng, ... Clicked:8823 Download:4151 Cited:0 <Full Text> <PPT> 2752 Frontiers of Information Technology & Electronic Engineering 2018 Vol.19 No.4 P.481-493 DOI:10.1631/FITEE.1601849 |
| 12 | Constructing pairing-free certificateless public key encryption with keyword search Author(s):Yang Lu, Ji-guo Li Clicked:8392 Download:4292 Cited:0 <Full Text> <PPT> 2284 Frontiers of Information Technology & Electronic Engineering 2019 Vol.20 No.8 P.1049-1060 DOI:10.1631/FITEE.1700534 |
| 13 | Double-authentication-preventing signatures revisited: new definition and construction from chameleon hash Author(s):Fei Li, Wei Gao, Gui-lin Wang, Ke-... Clicked:11138 Download:4669 Cited:0 <Full Text> <PPT> 2264 Frontiers of Information Technology & Electronic Engineering 2019 Vol.20 No.2 P.176-186 DOI:10.1631/FITEE.1700005 |
| 14 | Asymmetric pixel confusion algorithm for images based on RSA and Arnold transform Author(s):Xiao-ling Huang, You-xia Dong, Kai... Clicked:8153 Download:6403 Cited:0 <Full Text> <PPT> 2220 Frontiers of Information Technology & Electronic Engineering 2020 Vol.21 No.12 P.1783-1794 DOI:10.1631/FITEE.2000241 |
| 15 | Novel efficient identity-based signature on lattices Author(s):Jiang-shan Chen, Yu-pu Hu, Hong-me... Clicked:8644 Download:8190 Cited:0 <Full Text> <PPT> 2119 Frontiers of Information Technology & Electronic Engineering 2021 Vol.22 No.2 P.244-250 DOI:10.1631/FITEE.1900318 |