Deep search:Searching for "homomorphic encryption" in 'KEYWORD Got 4 items.
index Title
1Faster fog-aided private set intersection with integrity preserving
Author(s):Qiang Wang, Fu-cai Zhou, Tie-min M...  Clicked:6871  Download:4229  Cited:0  <Full Text>  <PPT> 2307
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.12 P.1558-1568  DOI:10.1631/FITEE.1800518
2Efficient privacy-preserving scheme for secure neural network inference
Author(s):Liquan CHEN, Zixuan YANG, Peng ZHA...  Clicked:1941  Download:3872  Cited:0  <Full Text>  <PPT> 441
Frontiers of Information Technology & Electronic Engineering  2025 Vol.26 No.9 P.1609-1623  DOI:10.1631/FITEE.2400371
3SPJEU: a self-sufficient plaintext-related JPEG image encryption scheme based on a unified key
Author(s):Ming LI, Wenwen ZHOU, Mengdie WANG...  Clicked:1964  Download:3668  Cited:0  <Full Text>
Frontiers of Information Technology & Electronic Engineering  2025 Vol.26 No.6 P.847-861  DOI:10.1631/FITEE.2400721
4Reversible data hiding in encrypted domain based on NTRU and Chinese remainder theorem
Author(s):Xinyue ZHANG, Kunyi LAI, Xin TANG  Clicked:44  Download:34  Cited:0  <Full Text>
Journal of Zhejiang University Science  1998 Vol.-1 No.-1 P.  DOI:10.1631/ENG.ITEE.2025.0138
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2026 Journal of Zhejiang University-SCIENCE