Advanced Search



13 results found in all.
index Title
1Applying two channels to vector space secret sharing based multi-signature scheme
Author(s):XIAO Qing-hua, PING Ling-di, CHEN Xiao-ping, PAN Xue-zeng  Clicked:8531  Download:4081  Cited:0  <Full Text>
Journal of Zhejiang University Science A  2005 Vol.6 No.1 P.56-62  DOI:10.1631/jzus.2005.A0056
2A secure threshold Paillier proxy signature scheme
Author(s):Pei-yih TING, Xiao-wei HUANG, Jun-hui WU, Chia-huei HSEU  Clicked:10469  Download:4758  Cited:1  <Full Text>
Journal of Zhejiang University Science C  2010 Vol.11 No.3 P.206-213  DOI:10.1631/jzus.C0910493
3Estimation of financial loss ratio for E-insurance: a quantitative model
Author(s):ZHONG Yuan-sheng, CHEN De-ren, SHI Min-hua  Clicked:5005  Download:3113  Cited:0  <Full Text>
Journal of Zhejiang University Science  2002 Vol.3 No.2 P.140-147  DOI:10.1631/jzus.2002.0140
4An incentive model for voting based on information-hiding in P2P networks
Author(s):Bo-wei Yang, Guang-hua Song, Yao Zheng  Clicked:9733  Download:3622  Cited:2  <Full Text>
Journal of Zhejiang University Science C  2010 Vol.11 No.12 P.967-975  DOI:10.1631/jzus.C0910727
5Efficient and secure three-party authenticated key exchange protocol for mobile environments
Author(s):Chih-ho Chou, Kuo-yu Tsai, Tzong-chen Wu, Kuo-hui Yeh  Clicked:8279  Download:4007  Cited:1  <Full Text>
Journal of Zhejiang University Science C  2013 Vol.14 No.5 P.347-355  DOI:10.1631/jzus.C1200273
6E-commerce business model mining and prediction
Author(s):Zhou-zhou He, Zhong-fei Zhang, Chun-ming Chen, Zheng-gang Wang  Clicked:13181  Download:4721  Cited:1  <Full Text>  <PPT> 2811
Frontiers of Information Technology & Electronic Engineering  2015 Vol.16 No.9 P.707-719  DOI:10.1631/FITEE.1500148
7A lightweight authentication scheme with user untraceability
Author(s):Kuo-Hui Yeh  Clicked:10520  Download:4431  Cited:2  <Full Text>  <PPT> 2931
Frontiers of Information Technology & Electronic Engineering  2015 Vol.16 No.4 P.259-271  DOI:10.1631/FITEE.1400232
8Special issue on artificial intelligence 2.0
Author(s):Yun-he Pan  Clicked:10186  Download:5372  Cited:1  <Full Text>
Frontiers of Information Technology & Electronic Engineering  2017 Vol.18 No.1 P.1-2  DOI:10.1631/FITEE.1710000
9A novel confidence estimation method for heterogeneous implicit feedback
Author(s):Jing Wang, Lan-fen Lin, Heng Zhang, Jia-qi Tu, Peng-hua Yu  Clicked:9938  Download:3814  Cited:0  <Full Text>  <PPT> 2941
Frontiers of Information Technology & Electronic Engineering  2017 Vol.18 No.11 P.1817-1827  DOI:10.1631/FITEE.1601468
10SmartPaint: a co-creative drawing system based on generative adversarial networks
Author(s):Lingyun Sun, Pei Chen, Wei Xiang, Peng Chen, Wei-yue Gao, Ke-jun Zhang  Clicked:10136  Download:4393  Cited:0  <Full Text>  <PPT> 2581
Frontiers of Information Technology & Electronic Engineering  2019 Vol.20 No.12 P.1644-1656  DOI:10.1631/FITEE.1900386
11Post-quantum blind signcryption scheme from lattice
Author(s):Huifang Yu, Lu Bai  Clicked:7213  Download:10931  Cited:0  <Full Text>  <PPT> 2220
Frontiers of Information Technology & Electronic Engineering  2021 Vol.22 No.6 P.891-901  DOI:10.1631/FITEE.2000099
12MyWAL: performance optimization by removing redundant input/output stack in key-value store
Author(s):Xiao ZHANG, Mengyu LI, Michael NGULUBE, Yonghao CHEN, Yiping ZHAO  Clicked:4336  Download:4343  Cited:0  <Full Text>  <PPT> 1056
Frontiers of Information Technology & Electronic Engineering  2023 Vol.24 No.7 P.980-993  DOI:10.1631/FITEE.2200496
13Detecting compromised accounts caused by phone number recycling on e-commerce platforms: taking Meituan as an example
Author(s):Min GAO, Shutong CHEN, Yangbo GAO, Zhenhua ZHANG, Yu CHEN, Yupeng LI, Qiongzan YE, Xin WANG, Yang CHEN  Clicked:4189  Download:5196  Cited:0  <Full Text>  <PPT> 913
Frontiers of Information Technology & Electronic Engineering  2024 Vol.25 No.8 P.1077-1095  DOI:10.1631/FITEE.2300291
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2026 Journal of Zhejiang University-SCIENCE