Deep search:Searching for "key management" in 'ABSTRACT and KEYWORDGot 8 items.
index Title
1A practical and dynamic key management scheme for a user hierarchy
Author(s):Jeng Fuh-gwo, Wang Chung-ming  Clicked:5520  Download:2607  Cited:1  <Full Text>
Journal of Zhejiang University Science A  2006 Vol.7 No.3 P.296-301  DOI:10.1631/jzus.2006.A0296
2Multiple hashes of single key with passcode for multiple accounts
Author(s):LEE Kok-wah, EWE Hong-tat  Clicked:5482  Download:3470  Cited:2  <Full Text>
Journal of Zhejiang University Science A  2007 Vol.8 No.8 P.1183-1190  DOI:10.1631/jzus.2007.A1183
3A new protocol of wide use for e-mail with perfect forward secrecy
Author(s):Tzung-her CHEN, Yan-ting WU  Clicked:7622  Download:3240  Cited:1  <Full Text>
Journal of Zhejiang University Science A  2010 Vol.11 No.1 P.74-78  DOI:10.1631/jzus.A0910126
4Building a highly available and intrusion tolerant database security and protection system (DSPS)
Author(s):CAI Liang, YANG Xiao-hu, DONG Jin-...  Clicked:4047  Download:2359  Cited:0  <Full Text>
Journal of Zhejiang University Science  2003 Vol.4 No.3 P.287-293  DOI:10.1631/jzus.2003.0287
5NaEPASC: a novel and efficient public auditing scheme for cloud data
Author(s):Shuang Tan, Yan Jia  Clicked:9369  Download:4417  Cited:7  <Full Text>  <PPT> 2028
Journal of Zhejiang University Science C  2014 Vol.15 No.9 P.794-804  DOI:10.1631/jzus.C1400045
6ImgFS: a transparent cryptography for stored images using a filesystem in userspace
Author(s):Osama A. Khashan, Abdullah M. Zin,...  Clicked:5865  Download:2498  Cited:0  <Full Text>  <PPT> 2079
Frontiers of Information Technology & Electronic Engineering  2015 Vol.16 No.1 P.28-42  DOI:10.1631/FITEE.1400133
7Cryptanalysis of an identity-based public auditing protocol for cloud storage
Author(s):Li-bing Wu, Jing Wang, De-biao He,...  Clicked:6869  Download:2263  Cited:0  <Full Text>  <PPT> 1810
Frontiers of Information Technology & Electronic Engineering  2017 Vol.18 No.12 P.1972-1977  DOI:10.1631/FITEE.1601530
8NEHASH: high-concurrency extendible hashing for non-volatile memory
Author(s):Tao CAI, Pengfei GAO, Dejiao NIU, ...  Clicked:1023  Download:1338  Cited:0  <Full Text>  <PPT> 202
Frontiers of Information Technology & Electronic Engineering  2023 Vol.24 No.5 P.703-715  DOI:10.1631/FITEE.2200462
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2024 Journal of Zhejiang University-SCIENCE