Deep search:Searching for "data privacy" in 'ABSTRACT and KEYWORDGot 4 items.
index Title
1Cryptanalysis of an identity-based public auditing protocol for cloud storage
Author(s):Li-bing Wu, Jing Wang, De-biao He,...  Clicked:5826  Download:1900  Cited:0  <Full Text>  <PPT> 1533
Frontiers of Information Technology & Electronic Engineering  2017 Vol.18 No.12 P.1972-1977  DOI:10.1631/FITEE.1601530
2Faster fog-aided private set intersection with integrity preserving
Author(s):Qiang Wang, Fu-cai Zhou, Tie-min M...  Clicked:3594  Download:1451  Cited:0  <Full Text>  <PPT> 1297
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.12 P.1558-1568  DOI:10.1631/FITEE.1800518
3A power resource dispatching framework with a privacy protection function in the Power Internet of Things
Author(s):Shuanggen LIU, Shuangzi ZHENG, Wen...  Clicked:809  Download:670  Cited:0  <Full Text>  <PPT> 98
Frontiers of Information Technology & Electronic Engineering  2022 Vol.23 No.9 P.1354-1368  DOI:10.1631/FITEE.2100518
4Federated unsupervised representation learning
Author(s):Fengda ZHANG, Kun KUANG, Long CHEN...  Clicked:297  Download:389  Cited:0  <Full Text>
Frontiers of Information Technology & Electronic Engineering  1998 Vol.-1 No.-1 P.  DOI:10.1631/FITEE.2200268
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2023 Journal of Zhejiang University-SCIENCE