Advanced Search



36 results found in all.
index Title
16Efficient revocation in ciphertext-policy attribute-based encryption based cryptographic cloud storage
Author(s):Yong Cheng, Zhi-ying Wang, Jun Ma, Jiang-jiang Wu, Song-zhu Mei, Jiang-chun Ren  Clicked:12868  Download:10222  Cited:14  <Full Text>
Journal of Zhejiang University Science C  2013 Vol.14 No.2 P.85-97  DOI:10.1631/jzus.C1200240
17Reliable beacon transmission based MAC protocol for LR-WPANs over WLAN interferences
Author(s):Ji-Hoon Park, Byung-Seo Kim  Clicked:10346  Download:4873  Cited:2  <Full Text>  <PPT> 2852
Journal of Zhejiang University Science C  2014 Vol.15 No.6 P.470-481  DOI:10.1631/jzus.C1300269
18Performance improvement for applying network virtualization in fiber-wireless (FiWi) access networks
Author(s):Qing-long Dai, Guo-chu Shou, Yi-hong Hu, Zhi-gang Guo  Clicked:9580  Download:4577  Cited:3  <Full Text>  <PPT> 2943
Journal of Zhejiang University Science C  2014 Vol.15 No.11 P.1058-1070  DOI:10.1631/jzus.C1400044
19A slotted floor acquisition multiple access based MAC protocol for underwater acoustic networks with RTS competition
Author(s):Liang-fang Qian, Sen-lin Zhang, Mei-qin Liu  Clicked:11359  Download:5274  Cited:4  <Full Text>  <PPT> 3388
Frontiers of Information Technology & Electronic Engineering  2015 Vol.16 No.3 P.217-226  DOI:10.1631/FITEE.1400187
20Anonymous-address-resolution model
Author(s):Guang-jia Song, Zhen-zhou Ji  Clicked:9301  Download:5059  Cited:0  <Full Text>  <PPT> 2716
Frontiers of Information Technology & Electronic Engineering  2016 Vol.17 No.10 P.1044-1055  DOI:10.1631/FITEE.1500382
21Enhancing the performance of future wireless networks with software-defined networking
Author(s):Mingjie Feng, Shiwen Mao, Tao Jiang  Clicked:8209  Download:5607  Cited:3  <Full Text>  <PPT> 2409
Frontiers of Information Technology & Electronic Engineering  2016 Vol.17 No.7 P.606-619  DOI:10.1631/FITEE.1500336
22Special issue on future network: software-defined networking
Author(s):Tao Huang, F. Richard Yu, Yun-jie LIU  Clicked:4706  Download:3476  Cited:0  <Full Text>
Frontiers of Information Technology & Electronic Engineering  2016 Vol.17 No.7 P.603-605  DOI:10.1631/FITEE.SDN2016
23ONFS: a hierarchical hybrid file system based on memory, SSD, and HDD for high performance computers
Author(s):Xin Liu, Yu-tong Lu, Jie Yu, Peng-fei Wang, Jie-ting Wu, Ying Lu  Clicked:12740  Download:6252  Cited:0  <Full Text>  <PPT> 2992
Frontiers of Information Technology & Electronic Engineering  2017 Vol.18 No.12 P.1940-1971  DOI:10.1631/FITEE.1700626
24Design of an eco-gearshift control strategy under a logic system framework
Author(s):Ming-xin Kang, Jin-wu Gao  Clicked:9625  Download:3766  Cited:0  <Full Text>  <PPT> 2289
Frontiers of Information Technology & Electronic Engineering  2020 Vol.21 No.2 P.340-350  DOI:10.1631/FITEE.1900459
25Generic user revocation systems for attribute-based encryption in cloud storage
Author(s):Genlang Chen, Zhiqian Xu, Hai Jiang, Kuan-ching Li  Clicked:9049  Download:4462  Cited:0  <Full Text>  <PPT> 2804
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.11 P.1362-1384  DOI:10.1631/FITEE.1800405
26Generic attribute revocation systems for attribute-based encryption in cloud storage
Author(s):Genlang Chen, Zhiqian Xu, Jia-jian Zhang, Guo-jun Wang, Hai Jiang, Miao-qing Huang  Clicked:10117  Download:3956  Cited:0  <Full Text>  <PPT> 2605
Frontiers of Information Technology & Electronic Engineering  2019 Vol.20 No.6 P.773-786  DOI:10.1631/FITEE.1800512
27Multi-level cross-layer protocol for end-to-end delay provisioning in wireless multimedia sensor networks
Author(s):Hossein Hadadian Nejad Yousefi, Yousef Seifi Kavian, Alimorad Mahmoudi  Clicked:10915  Download:4261  Cited:0  <Full Text>
Frontiers of Information Technology & Electronic Engineering  2019 Vol.20 No.9 P.1266-1276  DOI:10.1631/FITEE.1700855
28Effects of chain stiffness and shear flow on nanoparticle dispersion and distribution in ring polymer melts
Author(s):Dan Wang, Feng-qing Li, Xiang-hong Wang, Shi-ben Li, Lin-li He  Clicked:5413  Download:3909  Cited:0  <Full Text>  <PPT> 2725
Journal of Zhejiang University Science A  2020 Vol.21 No.3 P.229-239  DOI:10.1631/jzus.A1900530
29Theory and techniques for "intellicise" wireless networks
Author(s):Ping ZHANG, Mugen PENG, Shuguang CUI, Zhaoyang ZHANG, Guoqiang MAO, Zhi QUAN, Tony Q. S. QUEK, Bo RONG  Clicked:7353  Download:6191  Cited:0  <Full Text>
Frontiers of Information Technology & Electronic Engineering  2022 Vol.23 No.1 P.1-4  DOI:10.1631/FITEE.2210000
30An energy-efficient reconfigurable asymmetric modular cryptographic operation unit for RSA and ECC
Author(s):Mengni BIE, Wei LI, Tao CHEN, Longmei NAN, Danyang YANG  Clicked:9803  Download:11370  Cited:0  <Full Text>  <PPT> 1782
Frontiers of Information Technology & Electronic Engineering  2022 Vol.23 No.1 P.134-144  DOI:10.1631/FITEE.2000325
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2026 Journal of Zhejiang University-SCIENCE