
| index | Title |
| 1 | A novel mutual authentication and key agreement protocol based on NTRU cryptography for wireless communicat... Author(s):JIANG Jun, HE Chen Clicked:8393 Download:4677 Cited:1 <Full Text> Journal of Zhejiang University Science A 2005 Vol.6 No.5 P.399-404 DOI:10.1631/jzus.2005.A0399 |
| 2 | A practical and dynamic key management scheme for a user hierarchy Author(s):Jeng Fuh-gwo, Wang Chung-ming Clicked:7465 Download:3466 Cited:1 <Full Text> Journal of Zhejiang University Science A 2006 Vol.7 No.3 P.296-301 DOI:10.1631/jzus.2006.A0296 |
| 3 | CCA2 secure biometric identity based encryption with constant-size ciphertext Author(s):Yang Yang, Yu-pu Hu, Le-you Zhang,... Clicked:10508 Download:4605 Cited:1 <Full Text> Journal of Zhejiang University Science C 2011 Vol.12 No.10 P.819-827 DOI:10.1631/jzus.C1000429 |
| 4 | A leakage-resilient certificateless public key encryption scheme with CCA2 security Author(s):Yan-wei Zhou, Bo Yang, Hao Cheng, ... Clicked:8833 Download:4160 Cited:0 <Full Text> <PPT> 2755 Frontiers of Information Technology & Electronic Engineering 2018 Vol.19 No.4 P.481-493 DOI:10.1631/FITEE.1601849 |
| 5 | Constructing pairing-free certificateless public key encryption with keyword search Author(s):Yang Lu, Ji-guo Li Clicked:8397 Download:4302 Cited:0 <Full Text> <PPT> 2286 Frontiers of Information Technology & Electronic Engineering 2019 Vol.20 No.8 P.1049-1060 DOI:10.1631/FITEE.1700534 |
| 6 | Public key based bidirectional shadow image authentication without pixel expansion in image secret sharing Author(s):Xuehu YAN, Longlong LI, Jia CHEN, ... Clicked:4638 Download:16884 Cited:0 <Full Text> <PPT> 1300 Frontiers of Information Technology & Electronic Engineering 2023 Vol.24 No.1 P.88-103 DOI:10.1631/FITEE.2200118 |