Deep search:Searching for "key management" in 'ABSTRACTGot 8 items.
index Title
1A practical and dynamic key management scheme for a user hierarchy
Author(s):Jeng Fuh-gwo, Wang Chung-ming  Clicked:6262  Download:3006  Cited:1  <Full Text>
Journal of Zhejiang University Science A  2006 Vol.7 No.3 P.296-301  DOI:10.1631/jzus.2006.A0296
2A new protocol of wide use for e-mail with perfect forward secrecy
Author(s):Tzung-her CHEN, Yan-ting WU  Clicked:8992  Download:3742  Cited:1  <Full Text>
Journal of Zhejiang University Science A  2010 Vol.11 No.1 P.74-78  DOI:10.1631/jzus.A0910126
3Building a highly available and intrusion tolerant database security and protection system (DSPS)
Author(s):CAI Liang, YANG Xiao-hu, DONG Jin-...  Clicked:4557  Download:2723  Cited:0  <Full Text>
Journal of Zhejiang University Science  2003 Vol.4 No.3 P.287-293  DOI:10.1631/jzus.2003.0287
4NaEPASC: a novel and efficient public auditing scheme for cloud data
Author(s):Shuang Tan, Yan Jia  Clicked:11310  Download:5425  Cited:7  <Full Text>  <PPT> 2451
Journal of Zhejiang University Science C  2014 Vol.15 No.9 P.794-804  DOI:10.1631/jzus.C1400045
5ImgFS: a transparent cryptography for stored images using a filesystem in userspace
Author(s):Osama A. Khashan, Abdullah M. Zin,...  Clicked:7249  Download:3587  Cited:0  <Full Text>  <PPT> 2470
Frontiers of Information Technology & Electronic Engineering  2015 Vol.16 No.1 P.28-42  DOI:10.1631/FITEE.1400133
6Cryptanalysis of an identity-based public auditing protocol for cloud storage
Author(s):Li-bing Wu, Jing Wang, De-biao He,...  Clicked:8932  Download:2976  Cited:0  <Full Text>  <PPT> 2350
Frontiers of Information Technology & Electronic Engineering  2017 Vol.18 No.12 P.1972-1977  DOI:10.1631/FITEE.1601530
7NEHASH: high-concurrency extendible hashing for non-volatile memory
Author(s):Tao CAI, Pengfei GAO, Dejiao NIU, ...  Clicked:2826  Download:3251  Cited:0  <Full Text>  <PPT> 518
Frontiers of Information Technology & Electronic Engineering  2023 Vol.24 No.5 P.703-715  DOI:10.1631/FITEE.2200462
8SPJEU: a self-sufficient plaintext-related JPEG image encryption scheme based on a unified key
Author(s):Ming LI, Wenwen ZHOU, Mengdie WANG...  Clicked:679  Download:544  Cited:0  <Full Text>
Frontiers of Information Technology & Electronic Engineering  2025 Vol.26 No.6 P.847-861  DOI:10.1631/FITEE.2400721
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2025 Journal of Zhejiang University-SCIENCE