
| index | Title |
| 1 | Applying two channels to vector space secret sharing based multi-signature scheme Author(s):XIAO Qing-hua, PING Ling-di, CHEN ... Clicked:8649 Download:4137 Cited:0 <Full Text> Journal of Zhejiang University Science A 2005 Vol.6 No.1 P.56-62 DOI:10.1631/jzus.2005.A0056 |
| 2 | On ASGS framework: general requirements and an example of implementation Author(s):KULESZA Kamil, KOTULSKI Zbigniew Clicked:7688 Download:4072 Cited:0 <Full Text> Journal of Zhejiang University Science A 2007 Vol.8 No.4 P.511-521 DOI:10.1631/jzus.2007.A0511 |
| 3 | CCA2 secure biometric identity based encryption with constant-size ciphertext Author(s):Yang Yang, Yu-pu Hu, Le-you Zhang,... Clicked:10508 Download:4605 Cited:1 <Full Text> Journal of Zhejiang University Science C 2011 Vol.12 No.10 P.819-827 DOI:10.1631/jzus.C1000429 |
| 4 | A secure data sharing scheme with cheating detection based on Chaum-Pedersen protocol for cloud storage Author(s):Xin Wang, Bo Yang, Zhe Xia, Hong-x... Clicked:10196 Download:4163 Cited:0 <Full Text> <PPT> 2540 Frontiers of Information Technology & Electronic Engineering 2019 Vol.20 No.6 P.787-800 DOI:10.1631/FITEE.1800066 |
| 5 | Identity-based threshold proxy re-encryption scheme from lattices and its applications Author(s):Liqiang WU, Yiliang HAN, Xiaoyuan ... Clicked:9060 Download:14383 Cited:0 <Full Text> <PPT> 1390 Frontiers of Information Technology & Electronic Engineering 2022 Vol.23 No.2 P.258-277 DOI:10.1631/FITEE.2000366 |
| 6 | Public key based bidirectional shadow image authentication without pixel expansion in image secret sharing Author(s):Xuehu YAN, Longlong LI, Jia CHEN, ... Clicked:4638 Download:16884 Cited:0 <Full Text> <PPT> 1300 Frontiers of Information Technology & Electronic Engineering 2023 Vol.24 No.1 P.88-103 DOI:10.1631/FITEE.2200118 |
| 7 | Reversible data hiding in encrypted images based on additive secret sharing and additive joint coding using... Author(s):Ziyi ZHOU, Chengyue WANG, Kexun YA... Clicked:3656 Download:2745 Cited:0 <Full Text> <PPT> 765 Frontiers of Information Technology & Electronic Engineering 2024 Vol.25 No.9 P.1250-1265 DOI:10.1631/FITEE.2300750 |
| 8 | Efficient privacy-preserving scheme for secure neural network inference Author(s):Liquan CHEN, Zixuan YANG, Peng ZHA... Clicked:2136 Download:4482 Cited:0 <Full Text> <PPT> 507 Frontiers of Information Technology & Electronic Engineering 2025 Vol.26 No.9 P.1609-1623 DOI:10.1631/FITEE.2400371 |