| index | Title |
| 16 | Multipurpose audio watermarking algorithm Author(s):Ning CHEN, Jie ZHU Clicked:7472 Download:4058 Cited:5 <Full Text> Journal of Zhejiang University Science A 2008 Vol.9 No.4 P.517-523 DOI:10.1631/jzus.A071493 |
| 17 | Integrated criteria for covert channel auditing Author(s):Chang-da WANG, Shi-guang JU Clicked:6161 Download:4044 Cited:0 <Full Text> Journal of Zhejiang University Science A 2008 Vol.9 No.6 P.737-743 DOI:10.1631/jzus.A071510 |
| 18 | Cryptanalysis of an image encryption scheme based on the Hill cipher Author(s):Cheng-qing LI, Dan ZHANG, Guan-rong CHEN Clicked:7432 Download:4722 Cited:7 <Full Text> Journal of Zhejiang University Science A 2008 Vol.9 No.8 P.1118-1123 DOI:10.1631/jzus.A0720102 |
| 19 | Improved Feistel-based ciphers for wireless sensor network security Author(s):Tamara PAZYNYUK, Jian-zhong LI, George S. OREKU Clicked:8431 Download:6667 Cited:1 <Full Text> Journal of Zhejiang University Science A 2008 Vol.9 No.8 P.1111-1117 DOI:10.1631/jzus.A0720108 |
| 20 | Comments on “How to repair the Hill cipher” Author(s):Y. RANGEL-ROMERO, R. VEGA-GARCÍA, A. MENCHACA-MÉNDEZ, D. ACOLTZI-CERVANTES, L. MARTÍNEZ-RAMOS, M. MECATE-ZAMBRANO, F. MONTALVO-LEZAMA, J. BARRÓN-VIDALES, N. CORTEZ-DUARTE, F. RODRÍGUEZ-HENRÍQUEZ Clicked:7439 Download:4508 Cited:5 <Full Text> Journal of Zhejiang University Science A 2008 Vol.9 No.2 P.211-214 DOI:10.1631/jzus.A072143 |
| 21 | Optimum allocation of FACTS devices in Fars Regional Electric Network using genetic algorithm based goal attainment Author(s):Mohsen GITIZADEH, Mohsen KALANTAR Clicked:9792 Download:5233 Cited:4 <Full Text> Journal of Zhejiang University Science A 2009 Vol.10 No.4 P.478-487 DOI:10.1631/jzus.A0820130 |
| 22 | WAPN: a distributed wormhole attack detection approach for wireless sensor networks Author(s):Fan-rui KONG, Chun-wen LI, Qing-qing DING, Guang-zhao CUI, Bing-yi CUI Clicked:9704 Download:4822 Cited:5 <Full Text> Journal of Zhejiang University Science A 2009 Vol.10 No.2 P.279-289 DOI:10.1631/jzus.A0820178 |
| 23 | Distributed anonymous data perturbation method for privacy-preserving data mining Author(s):Feng LI, Jin MA, Jian-hua LI Clicked:7982 Download:5794 Cited:3 <Full Text> Journal of Zhejiang University Science A 2009 Vol.10 No.7 P.952-963 DOI:10.1631/jzus.A0820320 |
| 24 | Liquid film dryout model for predicting critical heat flux in annular two-phase flow Author(s):Bo JIAO, Li-min QIU, Jun-liang LU, Zhi-hua GAN Clicked:9493 Download:5708 Cited:8 <Full Text> Journal of Zhejiang University Science A 2009 Vol.10 No.3 P.398-417 DOI:10.1631/jzus.A0820322 |
| 25 | Certificateless key-insulated signature without random oracles Author(s):Zhong-mei WAN, Xue-jia LAI, Jian WENG, Sheng-li LIU, Yu LONG, Xuan HONG Clicked:7606 Download:4168 Cited:8 <Full Text> Journal of Zhejiang University Science A 2009 Vol.10 No.12 P.1790-1800 DOI:10.1631/jzus.A0820714 |
| 26 | A new protocol of wide use for e-mail with perfect forward secrecy Author(s):Tzung-her CHEN, Yan-ting WU Clicked:9855 Download:5003 Cited:1 <Full Text> Journal of Zhejiang University Science C 2010 Vol.11 No.1 P.74-78 DOI:10.1631/jzus.A0910126 |
| 27 | Groundwater protection: What can we learn from Germany? Author(s):Yan ZHU, Klaus-Dieter BALKE Clicked:6914 Download:3683 Cited:3 <Full Text> Journal of Zhejiang University Science B 2008 Vol.9 No.3 P.227-231 DOI:10.1631/jzus.B0710639 |
| 28 | Proactive worm propagation modeling and analysis in unstructured peer-to-peer networks Author(s):Xiao-song ZHANG, Ting CHEN, Jiong ZHENG, Hua LI Clicked:14211 Download:5461 Cited:8 <Full Text> Journal of Zhejiang University Science C 2010 Vol.11 No.2 P.119-129 DOI:10.1631/jzus.C0910488 |
| 29 | Building a highly available and intrusion tolerant database security and protection system (DSPS) Author(s):CAI Liang, YANG Xiao-hu, DONG Jin-xiang Clicked:5385 Download:3119 Cited:0 <Full Text> Journal of Zhejiang University Science 2003 Vol.4 No.3 P.287-293 DOI:10.1631/jzus.2003.0287 |
| 30 | Distributed heterogeneous inspecting system and its middleware-based solution Author(s):HUANG Li-can, WU Zhao-hui, PAN Yun-he Clicked:6190 Download:3151 Cited:0 <Full Text> Journal of Zhejiang University Science 2003 Vol.4 No.5 P.542-548 DOI:10.1631/jzus.2003.0542 |
