Deep search:Searching for "information leakage" in 'ABSTRACTGot 4 items.
index Title
1Enhancing security of NVM-based main memory with dynamic Feistel network mapping
Author(s):Fang-ting Huang, Dan Feng, Wen Xia...  Clicked:7882  Download:3116  Cited:0  <Full Text>  <PPT> 2151
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.7 P.847-863  DOI:10.1631/FITEE.1601652
2Driftor: mitigating cloud-based side-channel attacks by switching and migrating multi-executor virtual mach...
Author(s):Chao Yang, Yun-fei Guo, Hong-chao ...  Clicked:6427  Download:2463  Cited:0  <Full Text>  <PPT> 1898
Frontiers of Information Technology & Electronic Engineering  2019 Vol.20 No.5 P.731-748  DOI:10.1631/FITEE.1800526
3Identity-based searchable attribute signcryption in lattice for a blockchain-based medical system
Author(s):Huifang YU, Xiaoping BAI  Clicked:2341  Download:1305  Cited:0  <Full Text>
Frontiers of Information Technology & Electronic Engineering  2024 Vol.25 No.3 P.461-471  DOI:10.1631/FITEE.2300248
4Near-field secure wireless communication with delay alignment modulation
Author(s):Haiquan LU, Yong ZENG  Clicked:846  Download:621  Cited:0  <Full Text>  <PPT> 151
Frontiers of Information Technology & Electronic Engineering  2025 Vol.26 No.1 P.134-145  DOI:10.1631/FITEE.2400271
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2025 Journal of Zhejiang University-SCIENCE