Deep search:Searching for "Data privacy" in 'KEYWORDGot 3 items.
index Title
1Cryptanalysis of an identity-based public auditing protocol for cloud storage
Author(s):Li-bing Wu, Jing Wang, De-biao He,...  Clicked:9115  Download:3142  Cited:0  <Full Text>  <PPT> 2540
Frontiers of Information Technology & Electronic Engineering  2017 Vol.18 No.12 P.1972-1977  DOI:10.1631/FITEE.1601530
2Faster fog-aided private set intersection with integrity preserving
Author(s):Qiang Wang, Fu-cai Zhou, Tie-min M...  Clicked:5652  Download:2915  Cited:0  <Full Text>  <PPT> 1907
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.12 P.1558-1568  DOI:10.1631/FITEE.1800518
3FedSTGCN: a novel federated spatiotemporal graph learning-based network intrusion detection method for the ...
Author(s):Yalu WANG, Jie LI, Zhijie HAN, Pu ...  Clicked:358  Download:479  Cited:0  <Full Text>
Frontiers of Information Technology & Electronic Engineering  2025 Vol.26 No.7 P.1164-1179  DOI:10.1631/FITEE.2400932
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2025 Journal of Zhejiang University-SCIENCE