Deep search:Searching for "Data privacy" in 'KEYWORDGot 3 items.
index Title
1Cryptanalysis of an identity-based public auditing protocol for cloud storage
Author(s):Li-bing Wu, Jing Wang, De-biao He,...  Clicked:9258  Download:3199  Cited:0  <Full Text>  <PPT> 2613
Frontiers of Information Technology & Electronic Engineering  2017 Vol.18 No.12 P.1972-1977  DOI:10.1631/FITEE.1601530
2Faster fog-aided private set intersection with integrity preserving
Author(s):Qiang Wang, Fu-cai Zhou, Tie-min M...  Clicked:6082  Download:3000  Cited:0  <Full Text>  <PPT> 1961
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.12 P.1558-1568  DOI:10.1631/FITEE.1800518
3FedSTGCN: a novel federated spatiotemporal graph learning-based network intrusion detection method for the ...
Author(s):Yalu WANG, Jie LI, Zhijie HAN, Pu ...  Clicked:902  Download:694  Cited:0  <Full Text>
Frontiers of Information Technology & Electronic Engineering  2025 Vol.26 No.7 P.1164-1179  DOI:10.1631/FITEE.2400932
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2025 Journal of Zhejiang University-SCIENCE