Advanced Search



18 results found in all.
index Title
1Protection of mobile location privacy by using blind signature
Author(s):LIAO Jian, QI Ying-hao, HUANG Pei-wei, RONG Meng-tian, LI Sheng-hong  Clicked:6871  Download:4254  Cited:43  <Full Text>
Journal of Zhejiang University Science A  2006 Vol.7 No.6 P.984-989  DOI:10.1631/jzus.2006.A0984
2A fine-grained access control model for relational databases
Author(s):Jie Shi, Hong Zhu  Clicked:9995  Download:4293  Cited:6  <Full Text>
Journal of Zhejiang University Science C  2010 Vol.11 No.8 P.575-586  DOI:10.1631/jzus.C0910466
3EDA: an enhanced dual-active algorithm for location privacy preservation in mobile P2P networks
Author(s):Yan-zhe Che, Kevin Chiew, Xiao-yan Hong, Qiang Yang, Qin-ming He  Clicked:9243  Download:4218  Cited:0  <Full Text>
Journal of Zhejiang University Science C  2013 Vol.14 No.5 P.356-373  DOI:10.1631/jzus.C1200267
4Preserving privacy information flow security in composite service evolution
Author(s):Huan-feng Peng, Zhi-qiu Huang, Lin-yuan Liu, Yong Li, Da-juan Fan, Yu-qing Wang  Clicked:8759  Download:3731  Cited:0  <Full Text>  <PPT> 2213
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.5 P.626-638  DOI:10.1631/FITEE.1700359
5Generic user revocation systems for attribute-based encryption in cloud storage
Author(s):Genlang Chen, Zhiqian Xu, Hai Jiang, Kuan-ching Li  Clicked:8879  Download:4241  Cited:0  <Full Text>  <PPT> 2759
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.11 P.1362-1384  DOI:10.1631/FITEE.1800405
6Generic attribute revocation systems for attribute-based encryption in cloud storage
Author(s):Genlang Chen, Zhiqian Xu, Jia-jian Zhang, Guo-jun Wang, Hai Jiang, Miao-qing Huang  Clicked:9980  Download:3743  Cited:0  <Full Text>  <PPT> 2569
Frontiers of Information Technology & Electronic Engineering  2019 Vol.20 No.6 P.773-786  DOI:10.1631/FITEE.1800512
7MULKASE: a novel approach for key-aggregate searchable encryption for multi-owner data
Author(s):Mukti Padhya, Devesh C. Jinwala  Clicked:9427  Download:4781  Cited:0  <Full Text>  <PPT> 2218
Frontiers of Information Technology & Electronic Engineering  2019 Vol.20 No.12 P.1717-1748  DOI:10.1631/FITEE.1800192
8Self-deployed execution environment for high performance computing
Author(s):Mingtian SHAO, Kai LU, Wenzhe ZHANG  Clicked:7869  Download:13461  Cited:0  <Full Text>  <PPT> 1094
Frontiers of Information Technology & Electronic Engineering  2022 Vol.23 No.6 P.845-857  DOI:10.1631/FITEE.2100016
9A power resource dispatching framework with a privacy protection function in the Power Internet of Things
Author(s):Shuanggen LIU, Shuangzi ZHENG, Wenbo ZHANG, Runsheng FU  Clicked:5088  Download:8608  Cited:0  <Full Text>  <PPT> 1160
Frontiers of Information Technology & Electronic Engineering  2022 Vol.23 No.9 P.1354-1368  DOI:10.1631/FITEE.2100518
10A survey of energy-efficient strategies for federated learning in mobile edge computing
Author(s):Kang YAN, Nina SHU, Tao WU, Chunsheng LIU, Panlong YANG  Clicked:5210  Download:4174  Cited:0  <Full Text>  <PPT> 975
Frontiers of Information Technology & Electronic Engineering  2024 Vol.25 No.5 P.645-663  DOI:10.1631/FITEE.2300181
11PPDO: a privacy-preservation-aware delay optimization task-offloading algorithm for collaborative edge computing
Author(s):Chao JING, Jianwu XU  Clicked:3585  Download:4236  Cited:0  <Full Text>  <PPT> 900
Frontiers of Information Technology & Electronic Engineering  2025 Vol.26 No.1 P.27-41  DOI:10.1631/FITEE.2300741
12An efficient online histogram publication method for data streams with local differential privacy
Author(s):Tao TAO, Funan ZHANG, Xiujun WANG, Xiao ZHENG, Xin ZHAO  Clicked:2896  Download:3306  Cited:0  <Full Text>  <PPT> 899
Frontiers of Information Technology & Electronic Engineering  2024 Vol.25 No.8 P.1096-1109  DOI:10.1631/FITEE.2300368
13Reversible data hiding scheme for encrypted JPEG bitstreams using adaptive RZL rotation
Author(s):Yongning GUO, Guodong SU, Zhiqiang YAO, Wang ZHOU  Clicked:3244  Download:2437  Cited:0  <Full Text>  <PPT> 787
Frontiers of Information Technology & Electronic Engineering  2024 Vol.25 No.10 P.1353-1369  DOI:10.1631/FITEE.2300749
14A privacy-preserving vehicle trajectory clustering framework
Author(s):Ran TIAN, Pulun GAO, Yanxing LIU  Clicked:3693  Download:3307  Cited:0  <Full Text>  <PPT> 892
Frontiers of Information Technology & Electronic Engineering  2024 Vol.25 No.7 P.988-1002  DOI:10.1631/FITEE.2300369
15Adaptive layer splitting for wireless large language model inference in edge computing: a model-based reinforcement learning approach
Author(s):Yuxuan CHEN, Rongpeng LI, Xiaoxue YU, Zhifeng ZHAO, Honggang ZHANG  Clicked:3678  Download:3985  Cited:0  <Full Text>  <PPT> 816
Frontiers of Information Technology & Electronic Engineering  2025 Vol.26 No.2 P.278-292  DOI:10.1631/FITEE.2400468
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2026 Journal of Zhejiang University-SCIENCE