
| index | Title |
| 1 | Identity-based threshold proxy re-encryption scheme from lattices and its applications Author(s):Liqiang WU, Yiliang HAN, Xiaoyuan ... Clicked:9081 Download:14405 Cited:0 <Full Text> <PPT> 1400 Frontiers of Information Technology & Electronic Engineering 2022 Vol.23 No.2 P.258-277 DOI:10.1631/FITEE.2000366 |
| 2 | High capacity reversible data hiding in encrypted images based on adaptive quadtree partitioning and MSB pr... Author(s):Kaili QI, Minqing ZHANG, Fuqiang D... Clicked:3783 Download:13648 Cited:0 <Full Text> <PPT> 997 Frontiers of Information Technology & Electronic Engineering 2023 Vol.24 No.8 P.1156-1168 DOI:10.1631/FITEE.2200501 |