Deep search:Searching for "Homomorphic encryption" in 'KEYWORD Got 4 items.
index Title
1Faster fog-aided private set intersection with integrity preserving
Author(s):Qiang Wang, Fu-cai Zhou, Tie-min M...  Clicked:6897  Download:4308  Cited:0  <Full Text>  <PPT> 2317
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.12 P.1558-1568  DOI:10.1631/FITEE.1800518
2Efficient privacy-preserving scheme for secure neural network inference
Author(s):Liquan CHEN, Zixuan YANG, Peng ZHA...  Clicked:2000  Download:4077  Cited:0  <Full Text>  <PPT> 458
Frontiers of Information Technology & Electronic Engineering  2025 Vol.26 No.9 P.1609-1623  DOI:10.1631/FITEE.2400371
3SPJEU: a self-sufficient plaintext-related JPEG image encryption scheme based on a unified key
Author(s):Ming LI, Wenwen ZHOU, Mengdie WANG...  Clicked:2002  Download:3891  Cited:0  <Full Text>
Frontiers of Information Technology & Electronic Engineering  2025 Vol.26 No.6 P.847-861  DOI:10.1631/FITEE.2400721
4Reversible data hiding in encrypted domain based on NTRU and Chinese remainder theorem
Author(s):Xinyue ZHANG, Kunyi LAI, Xin TANG  Clicked:122  Download:81  Cited:0  <Full Text>
Journal of Zhejiang University Science  1998 Vol.-1 No.-1 P.  DOI:10.1631/ENG.ITEE.2025.0138
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2026 Journal of Zhejiang University-SCIENCE