
| index | Title |
| 1 | An application-layer based centralized information access control for VPN Author(s):Ouyang Kai, Zhou Jing-li, Xia Tao,... Clicked:8358 Download:3921 Cited:0 <Full Text> Journal of Zhejiang University Science A 2006 Vol.7 No.2 P.240-249 DOI:10.1631/jzus.2006.A0240 |
| 2 | A practical and dynamic key management scheme for a user hierarchy Author(s):Jeng Fuh-gwo, Wang Chung-ming Clicked:7466 Download:3466 Cited:1 <Full Text> Journal of Zhejiang University Science A 2006 Vol.7 No.3 P.296-301 DOI:10.1631/jzus.2006.A0296 |
| 3 | Network-adaptive HD MPEG-2 video streaming with cross-layered channel monitoring in WLAN Author(s):Park Sanghoon, Yoon Hayoung, Kim J... Clicked:7527 Download:3906 Cited:9 <Full Text> Journal of Zhejiang University Science A 2006 Vol.7 No.5 P.885-893 DOI:10.1631/jzus.2006.A0885 |
| 4 | A cross-layer design approach on spectrum allocation and resource scheduling in cognitive PMP networks Author(s):Jie CHEN, Min-jian ZHAO, Qiao ZHOU... Clicked:8248 Download:4295 Cited:0 <Full Text> Journal of Zhejiang University Science A 2008 Vol.9 No.4 P.435-444 DOI:10.1631/jzus.A071373 |
| 5 | A cross-layer approach to enable multipacket transmission in MIMO-SDMA based WLAN Author(s):Sheng-bo CHEN, Wei CHEN, Wei-lan H... Clicked:9109 Download:4380 Cited:1 <Full Text> Journal of Zhejiang University Science A 2009 Vol.10 No.2 P.271-278 DOI:10.1631/jzus.A0820362 |
| 6 | Conflict detection and resolution for authorization policies in workflow systems Author(s):Chen-hua MA, Guo-dong LU, Jiong QIU Clicked:7313 Download:3840 Cited:4 <Full Text> Journal of Zhejiang University Science A 2009 Vol.10 No.8 P.1082-1092 DOI:10.1631/jzus.A0820366 |
| 7 | Consistency maintenance for constraint in role-based access control model Author(s):HAN Wei-li, CHEN Gang, YIN Jian-we... Clicked:6458 Download:3289 Cited:0 <Full Text> Journal of Zhejiang University Science 2002 Vol.3 No.3 P.292-297 DOI:10.1631/jzus.2002.0292 |
| 8 | Minimal role mining method for Web service composition Author(s):Chao Huang, Jian-ling Sun, Xin-yu ... Clicked:10083 Download:3893 Cited:4 <Full Text> Journal of Zhejiang University Science C 2010 Vol.11 No.5 P.328-339 DOI:10.1631/jzus.C0910186 |
| 9 | A fine-grained access control model for relational databases Author(s):Jie Shi, Hong Zhu Clicked:10068 Download:4322 Cited:6 <Full Text> Journal of Zhejiang University Science C 2010 Vol.11 No.8 P.575-586 DOI:10.1631/jzus.C0910466 |
| 10 | An authorization model for collaborative access control Author(s):Chen-hua Ma, Guo-dong Lu, Jiong Qiu Clicked:9160 Download:3599 Cited:3 <Full Text> Journal of Zhejiang University Science C 2010 Vol.11 No.9 P.699-717 DOI:10.1631/jzus.C0910564 |
| 11 | Funneling media access control (MAC) protocol for underwater acoustic sensor networks Author(s):Guang-yu Fan, Hui-fang Chen, Lei X... Clicked:10786 Download:4535 Cited:2 <Full Text> Journal of Zhejiang University Science C 2011 Vol.12 No.11 P.932-941 DOI:10.1631/jzus.C1000388 |
| 12 | Efficient revocation in ciphertext-policy attribute-based encryption based cryptographic cloud storage Author(s):Yong Cheng, Zhi-ying Wang, Jun Ma,... Clicked:12838 Download:10134 Cited:14 <Full Text> Journal of Zhejiang University Science C 2013 Vol.14 No.2 P.85-97 DOI:10.1631/jzus.C1200240 |
| 13 | Reliable beacon transmission based MAC protocol for LR-WPANs over WLAN interferences Author(s):Ji-Hoon Park, Byung-Seo Kim Clicked:10297 Download:4793 Cited:2 <Full Text> <PPT> 2832 Journal of Zhejiang University Science C 2014 Vol.15 No.6 P.470-481 DOI:10.1631/jzus.C1300269 |
| 14 | A slotted floor acquisition multiple access based MAC protocol for underwater acoustic networks with RTS co... Author(s):Liang-fang Qian, Sen-lin Zhang, Me... Clicked:11265 Download:5185 Cited:4 <Full Text> <PPT> 3361 Frontiers of Information Technology & Electronic Engineering 2015 Vol.16 No.3 P.217-226 DOI:10.1631/FITEE.1400187 |
| 15 | Anonymous-address-resolution model Author(s):Guang-jia Song, Zhen-zhou Ji Clicked:9191 Download:4982 Cited:0 <Full Text> <PPT> 2696 Frontiers of Information Technology & Electronic Engineering 2016 Vol.17 No.10 P.1044-1055 DOI:10.1631/FITEE.1500382 |