Deep search:Searching for "key management" in 'ABSTRACTGot 8 items.
index Title
1A practical and dynamic key management scheme for a user hierarchy
Author(s):Jeng Fuh-gwo, Wang Chung-ming  Clicked:6340  Download:3121  Cited:1  <Full Text>
Journal of Zhejiang University Science A  2006 Vol.7 No.3 P.296-301  DOI:10.1631/jzus.2006.A0296
2A new protocol of wide use for e-mail with perfect forward secrecy
Author(s):Tzung-her CHEN, Yan-ting WU  Clicked:9096  Download:4636  Cited:1  <Full Text>
Journal of Zhejiang University Science A  2010 Vol.11 No.1 P.74-78  DOI:10.1631/jzus.A0910126
3Building a highly available and intrusion tolerant database security and protection system (DSPS)
Author(s):CAI Liang, YANG Xiao-hu, DONG Jin-...  Clicked:4628  Download:2812  Cited:0  <Full Text>
Journal of Zhejiang University Science  2003 Vol.4 No.3 P.287-293  DOI:10.1631/jzus.2003.0287
4NaEPASC: a novel and efficient public auditing scheme for cloud data
Author(s):Shuang Tan, Yan Jia  Clicked:11435  Download:7124  Cited:7  <Full Text>  <PPT> 2580
Journal of Zhejiang University Science C  2014 Vol.15 No.9 P.794-804  DOI:10.1631/jzus.C1400045
5ImgFS: a transparent cryptography for stored images using a filesystem in userspace
Author(s):Osama A. Khashan, Abdullah M. Zin,...  Clicked:7428  Download:3714  Cited:0  <Full Text>  <PPT> 2628
Frontiers of Information Technology & Electronic Engineering  2015 Vol.16 No.1 P.28-42  DOI:10.1631/FITEE.1400133
6Cryptanalysis of an identity-based public auditing protocol for cloud storage
Author(s):Li-bing Wu, Jing Wang, De-biao He,...  Clicked:9108  Download:3140  Cited:0  <Full Text>  <PPT> 2538
Frontiers of Information Technology & Electronic Engineering  2017 Vol.18 No.12 P.1972-1977  DOI:10.1631/FITEE.1601530
7NEHASH: high-concurrency extendible hashing for non-volatile memory
Author(s):Tao CAI, Pengfei GAO, Dejiao NIU, ...  Clicked:2965  Download:3407  Cited:0  <Full Text>  <PPT> 645
Frontiers of Information Technology & Electronic Engineering  2023 Vol.24 No.5 P.703-715  DOI:10.1631/FITEE.2200462
8SPJEU: a self-sufficient plaintext-related JPEG image encryption scheme based on a unified key
Author(s):Ming LI, Wenwen ZHOU, Mengdie WANG...  Clicked:842  Download:1207  Cited:0  <Full Text>
Frontiers of Information Technology & Electronic Engineering  2025 Vol.26 No.6 P.847-861  DOI:10.1631/FITEE.2400721
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2025 Journal of Zhejiang University-SCIENCE