
| index | Title |
| 1 | An application-layer based centralized information access control for VPN Author(s):Ouyang Kai, Zhou Jing-li, Xia Tao,... Clicked:8348 Download:3918 Cited:0 <Full Text> Journal of Zhejiang University Science A 2006 Vol.7 No.2 P.240-249 DOI:10.1631/jzus.2006.A0240 |
| 2 | A cross-layer approach to enable multipacket transmission in MIMO-SDMA based WLAN Author(s):Sheng-bo CHEN, Wei CHEN, Wei-lan H... Clicked:9087 Download:4377 Cited:1 <Full Text> Journal of Zhejiang University Science A 2009 Vol.10 No.2 P.271-278 DOI:10.1631/jzus.A0820362 |
| 3 | Consistency maintenance for constraint in role-based access control model Author(s):HAN Wei-li, CHEN Gang, YIN Jian-we... Clicked:6449 Download:3286 Cited:0 <Full Text> Journal of Zhejiang University Science 2002 Vol.3 No.3 P.292-297 DOI:10.1631/jzus.2002.0292 |
| 4 | Minimal role mining method for Web service composition Author(s):Chao Huang, Jian-ling Sun, Xin-yu ... Clicked:10072 Download:3887 Cited:4 <Full Text> Journal of Zhejiang University Science C 2010 Vol.11 No.5 P.328-339 DOI:10.1631/jzus.C0910186 |
| 5 | A fine-grained access control model for relational databases Author(s):Jie Shi, Hong Zhu Clicked:10061 Download:4318 Cited:6 <Full Text> Journal of Zhejiang University Science C 2010 Vol.11 No.8 P.575-586 DOI:10.1631/jzus.C0910466 |
| 6 | An authorization model for collaborative access control Author(s):Chen-hua Ma, Guo-dong Lu, Jiong Qiu Clicked:9152 Download:3597 Cited:3 <Full Text> Journal of Zhejiang University Science C 2010 Vol.11 No.9 P.699-717 DOI:10.1631/jzus.C0910564 |
| 7 | Funneling media access control (MAC) protocol for underwater acoustic sensor networks Author(s):Guang-yu Fan, Hui-fang Chen, Lei X... Clicked:10768 Download:4533 Cited:2 <Full Text> Journal of Zhejiang University Science C 2011 Vol.12 No.11 P.932-941 DOI:10.1631/jzus.C1000388 |
| 8 | Efficient revocation in ciphertext-policy attribute-based encryption based cryptographic cloud storage Author(s):Yong Cheng, Zhi-ying Wang, Jun Ma,... Clicked:12827 Download:10109 Cited:14 <Full Text> Journal of Zhejiang University Science C 2013 Vol.14 No.2 P.85-97 DOI:10.1631/jzus.C1200240 |
| 9 | A slotted floor acquisition multiple access based MAC protocol for underwater acoustic networks with RTS co... Author(s):Liang-fang Qian, Sen-lin Zhang, Me... Clicked:11255 Download:5169 Cited:4 <Full Text> <PPT> 3354 Frontiers of Information Technology & Electronic Engineering 2015 Vol.16 No.3 P.217-226 DOI:10.1631/FITEE.1400187 |
| 10 | Generic user revocation systems for attribute-based encryption in cloud storage Author(s):Genlang Chen, Zhiqian Xu, Hai Jian... Clicked:8956 Download:4357 Cited:0 <Full Text> <PPT> 2777 Frontiers of Information Technology & Electronic Engineering 2018 Vol.19 No.11 P.1362-1384 DOI:10.1631/FITEE.1800405 |
| 11 | Generic attribute revocation systems for attribute-based encryption in cloud storage Author(s):Genlang Chen, Zhiqian Xu, Jia-jian... Clicked:10062 Download:3850 Cited:0 <Full Text> <PPT> 2586 Frontiers of Information Technology & Electronic Engineering 2019 Vol.20 No.6 P.773-786 DOI:10.1631/FITEE.1800512 |
| 12 | RCDS: a right-confirmable data-sharing model based on symbol mapping coding and blockchain Author(s):Liang WANG, Shunjiu HUANG, Lina ZU... Clicked:4658 Download:15966 Cited:0 <Full Text> <PPT> 1144 Frontiers of Information Technology & Electronic Engineering 2023 Vol.24 No.8 P.1194-1213 DOI:10.1631/FITEE.2200659 |