
| index | Title |
| 1 | A practical and dynamic key management scheme for a user hierarchy Author(s):Jeng Fuh-gwo, Wang Chung-ming Clicked:7459 Download:3466 Cited:1 <Full Text> Journal of Zhejiang University Science A 2006 Vol.7 No.3 P.296-301 DOI:10.1631/jzus.2006.A0296 |
| 2 | A new protocol of wide use for e-mail with perfect forward secrecy Author(s):Tzung-her CHEN, Yan-ting WU Clicked:9840 Download:4992 Cited:1 <Full Text> Journal of Zhejiang University Science A 2010 Vol.11 No.1 P.74-78 DOI:10.1631/jzus.A0910126 |
| 3 | Building a highly available and intrusion tolerant database security and protection system (DSPS) Author(s):CAI Liang, YANG Xiao-hu, DONG Jin-... Clicked:5365 Download:3113 Cited:0 <Full Text> Journal of Zhejiang University Science 2003 Vol.4 No.3 P.287-293 DOI:10.1631/jzus.2003.0287 |
| 4 | NaEPASC: a novel and efficient public auditing scheme for cloud data Author(s):Shuang Tan, Yan Jia Clicked:12638 Download:9446 Cited:7 <Full Text> <PPT> 3110 Journal of Zhejiang University Science C 2014 Vol.15 No.9 P.794-804 DOI:10.1631/jzus.C1400045 |
| 5 | ImgFS: a transparent cryptography for stored images using a filesystem in userspace Author(s):Osama A. Khashan, Abdullah M. Zin,... Clicked:9158 Download:4991 Cited:0 <Full Text> <PPT> 3117 Frontiers of Information Technology & Electronic Engineering 2015 Vol.16 No.1 P.28-42 DOI:10.1631/FITEE.1400133 |
| 6 | Cryptanalysis of an identity-based public auditing protocol for cloud storage Author(s):Li-bing Wu, Jing Wang, De-biao He,... Clicked:10173 Download:4481 Cited:0 <Full Text> <PPT> 3026 Frontiers of Information Technology & Electronic Engineering 2017 Vol.18 No.12 P.1972-1977 DOI:10.1631/FITEE.1601530 |
| 7 | NEHASH: high-concurrency extendible hashing for non-volatile memory Author(s):Tao CAI, Pengfei GAO, Dejiao NIU, ... Clicked:4195 Download:6270 Cited:0 <Full Text> <PPT> 1037 Frontiers of Information Technology & Electronic Engineering 2023 Vol.24 No.5 P.703-715 DOI:10.1631/FITEE.2200462 |
| 8 | SPJEU: a self-sufficient plaintext-related JPEG image encryption scheme based on a unified key Author(s):Ming LI, Wenwen ZHOU, Mengdie WANG... Clicked:2117 Download:4185 Cited:0 <Full Text> Frontiers of Information Technology & Electronic Engineering 2025 Vol.26 No.6 P.847-861 DOI:10.1631/FITEE.2400721 |