| index | Title |
| 16 | Efficient revocation in ciphertext-policy attribute-based encryption based cryptographic cloud storage Author(s):Yong Cheng, Zhi-ying Wang, Jun Ma, Jiang-jiang Wu, Song-zhu Mei, Jiang-chun Ren Clicked:12868 Download:10222 Cited:14 <Full Text> Journal of Zhejiang University Science C 2013 Vol.14 No.2 P.85-97 DOI:10.1631/jzus.C1200240 |
| 17 | Reliable beacon transmission based MAC protocol for LR-WPANs over WLAN interferences Author(s):Ji-Hoon Park, Byung-Seo Kim Clicked:10346 Download:4873 Cited:2 <Full Text> <PPT> 2852 Journal of Zhejiang University Science C 2014 Vol.15 No.6 P.470-481 DOI:10.1631/jzus.C1300269 |
| 18 | Performance improvement for applying network virtualization in fiber-wireless (FiWi) access networks Author(s):Qing-long Dai, Guo-chu Shou, Yi-hong Hu, Zhi-gang Guo Clicked:9580 Download:4577 Cited:3 <Full Text> <PPT> 2943 Journal of Zhejiang University Science C 2014 Vol.15 No.11 P.1058-1070 DOI:10.1631/jzus.C1400044 |
| 19 | A slotted floor acquisition multiple access based MAC protocol for underwater acoustic networks with RTS competition Author(s):Liang-fang Qian, Sen-lin Zhang, Mei-qin Liu Clicked:11359 Download:5274 Cited:4 <Full Text> <PPT> 3388 Frontiers of Information Technology & Electronic Engineering 2015 Vol.16 No.3 P.217-226 DOI:10.1631/FITEE.1400187 |
| 20 | Anonymous-address-resolution model Author(s):Guang-jia Song, Zhen-zhou Ji Clicked:9301 Download:5059 Cited:0 <Full Text> <PPT> 2716 Frontiers of Information Technology & Electronic Engineering 2016 Vol.17 No.10 P.1044-1055 DOI:10.1631/FITEE.1500382 |
| 21 | Enhancing the performance of future wireless networks with software-defined networking Author(s):Mingjie Feng, Shiwen Mao, Tao Jiang Clicked:8209 Download:5607 Cited:3 <Full Text> <PPT> 2409 Frontiers of Information Technology & Electronic Engineering 2016 Vol.17 No.7 P.606-619 DOI:10.1631/FITEE.1500336 |
| 22 | Special issue on future network: software-defined networking Author(s):Tao Huang, F. Richard Yu, Yun-jie LIU Clicked:4706 Download:3476 Cited:0 <Full Text> Frontiers of Information Technology & Electronic Engineering 2016 Vol.17 No.7 P.603-605 DOI:10.1631/FITEE.SDN2016 |
| 23 | ONFS: a hierarchical hybrid file system based on memory, SSD, and HDD for high performance computers Author(s):Xin Liu, Yu-tong Lu, Jie Yu, Peng-fei Wang, Jie-ting Wu, Ying Lu Clicked:12740 Download:6252 Cited:0 <Full Text> <PPT> 2992 Frontiers of Information Technology & Electronic Engineering 2017 Vol.18 No.12 P.1940-1971 DOI:10.1631/FITEE.1700626 |
| 24 | Design of an eco-gearshift control strategy under a logic system framework Author(s):Ming-xin Kang, Jin-wu Gao Clicked:9625 Download:3766 Cited:0 <Full Text> <PPT> 2289 Frontiers of Information Technology & Electronic Engineering 2020 Vol.21 No.2 P.340-350 DOI:10.1631/FITEE.1900459 |
| 25 | Generic user revocation systems for attribute-based encryption in cloud storage Author(s):Genlang Chen, Zhiqian Xu, Hai Jiang, Kuan-ching Li Clicked:9049 Download:4462 Cited:0 <Full Text> <PPT> 2804 Frontiers of Information Technology & Electronic Engineering 2018 Vol.19 No.11 P.1362-1384 DOI:10.1631/FITEE.1800405 |
| 26 | Generic attribute revocation systems for attribute-based encryption in cloud storage Author(s):Genlang Chen, Zhiqian Xu, Jia-jian Zhang, Guo-jun Wang, Hai Jiang, Miao-qing Huang Clicked:10117 Download:3956 Cited:0 <Full Text> <PPT> 2605 Frontiers of Information Technology & Electronic Engineering 2019 Vol.20 No.6 P.773-786 DOI:10.1631/FITEE.1800512 |
| 27 | Multi-level cross-layer protocol for end-to-end delay provisioning in wireless multimedia sensor networks Author(s):Hossein Hadadian Nejad Yousefi, Yousef Seifi Kavian, Alimorad Mahmoudi Clicked:10915 Download:4261 Cited:0 <Full Text> Frontiers of Information Technology & Electronic Engineering 2019 Vol.20 No.9 P.1266-1276 DOI:10.1631/FITEE.1700855 |
| 28 | Effects of chain stiffness and shear flow on nanoparticle dispersion and distribution in ring polymer melts Author(s):Dan Wang, Feng-qing Li, Xiang-hong Wang, Shi-ben Li, Lin-li He Clicked:5413 Download:3909 Cited:0 <Full Text> <PPT> 2725 Journal of Zhejiang University Science A 2020 Vol.21 No.3 P.229-239 DOI:10.1631/jzus.A1900530 |
| 29 | Theory and techniques for "intellicise" wireless networks Author(s):Ping ZHANG, Mugen PENG, Shuguang CUI, Zhaoyang ZHANG, Guoqiang MAO, Zhi QUAN, Tony Q. S. QUEK, Bo RONG Clicked:7353 Download:6191 Cited:0 <Full Text> Frontiers of Information Technology & Electronic Engineering 2022 Vol.23 No.1 P.1-4 DOI:10.1631/FITEE.2210000 |
| 30 | An energy-efficient reconfigurable asymmetric modular cryptographic operation unit for RSA and ECC Author(s):Mengni BIE, Wei LI, Tao CHEN, Longmei NAN, Danyang YANG Clicked:9803 Download:11370 Cited:0 <Full Text> <PPT> 1782 Frontiers of Information Technology & Electronic Engineering 2022 Vol.23 No.1 P.134-144 DOI:10.1631/FITEE.2000325 |
