Advanced Search



36 results found in all.
index Title
16Efficient revocation in ciphertext-policy attribute-based encryption based cryptographic cloud storage
Author(s):Yong Cheng, Zhi-ying Wang, Jun Ma, Jiang-jiang Wu, Song-zhu Mei, Jiang-chun Ren  Clicked:11469  Download:8756  Cited:14  <Full Text>
Journal of Zhejiang University Science C  2013 Vol.14 No.2 P.85-97  DOI:10.1631/jzus.C1200240
17Reliable beacon transmission based MAC protocol for LR-WPANs over WLAN interferences
Author(s):Ji-Hoon Park, Byung-Seo Kim  Clicked:9125  Download:3511  Cited:2  <Full Text>  <PPT> 2392
Journal of Zhejiang University Science C  2014 Vol.15 No.6 P.470-481  DOI:10.1631/jzus.C1300269
18Performance improvement for applying network virtualization in fiber-wireless (FiWi) access networks
Author(s):Qing-long Dai, Guo-chu Shou, Yi-hong Hu, Zhi-gang Guo  Clicked:8480  Download:3178  Cited:3  <Full Text>  <PPT> 2517
Journal of Zhejiang University Science C  2014 Vol.15 No.11 P.1058-1070  DOI:10.1631/jzus.C1400044
19A slotted floor acquisition multiple access based MAC protocol for underwater acoustic networks with RTS competition
Author(s):Liang-fang Qian, Sen-lin Zhang, Mei-qin Liu  Clicked:9895  Download:3780  Cited:4  <Full Text>  <PPT> 2867
Frontiers of Information Technology & Electronic Engineering  2015 Vol.16 No.3 P.217-226  DOI:10.1631/FITEE.1400187
20Anonymous-address-resolution model
Author(s):Guang-jia Song, Zhen-zhou Ji  Clicked:7686  Download:3559  Cited:0  <Full Text>  <PPT> 2241
Frontiers of Information Technology & Electronic Engineering  2016 Vol.17 No.10 P.1044-1055  DOI:10.1631/FITEE.1500382
21Enhancing the performance of future wireless networks with software-defined networking
Author(s):Mingjie Feng, Shiwen Mao, Tao Jiang  Clicked:7064  Download:4054  Cited:3  <Full Text>  <PPT> 2009
Frontiers of Information Technology & Electronic Engineering  2016 Vol.17 No.7 P.606-619  DOI:10.1631/FITEE.1500336
22Special issue on future network: software-defined networking
Author(s):Tao Huang, F. Richard Yu, Yun-jie LIU  Clicked:3703  Download:2078  Cited:0  <Full Text>
Frontiers of Information Technology & Electronic Engineering  2016 Vol.17 No.7 P.603-605  DOI:10.1631/FITEE.SDN2016
23ONFS: a hierarchical hybrid file system based on memory, SSD, and HDD for high performance computers
Author(s):Xin Liu, Yu-tong Lu, Jie Yu, Peng-fei Wang, Jie-ting Wu, Ying Lu  Clicked:11164  Download:4187  Cited:0  <Full Text>  <PPT> 2387
Frontiers of Information Technology & Electronic Engineering  2017 Vol.18 No.12 P.1940-1971  DOI:10.1631/FITEE.1700626
24Design of an eco-gearshift control strategy under a logic system framework
Author(s):Ming-xin Kang, Jin-wu Gao  Clicked:8055  Download:2359  Cited:0  <Full Text>  <PPT> 1903
Frontiers of Information Technology & Electronic Engineering  2020 Vol.21 No.2 P.340-350  DOI:10.1631/FITEE.1900459
25Generic user revocation systems for attribute-based encryption in cloud storage
Author(s):Genlang Chen, Zhiqian Xu, Hai Jiang, Kuan-ching Li  Clicked:6835  Download:2944  Cited:0  <Full Text>  <PPT> 2274
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.11 P.1362-1384  DOI:10.1631/FITEE.1800405
26Generic attribute revocation systems for attribute-based encryption in cloud storage
Author(s):Genlang Chen, Zhiqian Xu, Jia-jian Zhang, Guo-jun Wang, Hai Jiang, Miao-qing Huang  Clicked:7609  Download:2430  Cited:0  <Full Text>  <PPT> 2199
Frontiers of Information Technology & Electronic Engineering  2019 Vol.20 No.6 P.773-786  DOI:10.1631/FITEE.1800512
27Multi-level cross-layer protocol for end-to-end delay provisioning in wireless multimedia sensor networks
Author(s):Hossein Hadadian Nejad Yousefi, Yousef Seifi Kavian, Alimorad Mahmoudi  Clicked:8189  Download:2361  Cited:0  <Full Text>
Frontiers of Information Technology & Electronic Engineering  2019 Vol.20 No.9 P.1266-1276  DOI:10.1631/FITEE.1700855
28Effects of chain stiffness and shear flow on nanoparticle dispersion and distribution in ring polymer melts
Author(s):Dan Wang, Feng-qing Li, Xiang-hong Wang, Shi-ben Li, Lin-li He  Clicked:4042  Download:2369  Cited:0  <Full Text>  <PPT> 2101
Journal of Zhejiang University Science A  2020 Vol.21 No.3 P.229-239  DOI:10.1631/jzus.A1900530
29Theory and techniques for "intellicise" wireless networks
Author(s):Ping ZHANG, Mugen PENG, Shuguang CUI, Zhaoyang ZHANG, Guoqiang MAO, Zhi QUAN, Tony Q. S. QUEK, Bo RONG  Clicked:4478  Download:4091  Cited:0  <Full Text>
Frontiers of Information Technology & Electronic Engineering  2022 Vol.23 No.1 P.1-4  DOI:10.1631/FITEE.2210000
30An energy-efficient reconfigurable asymmetric modular cryptographic operation unit for RSA and ECC
Author(s):Mengni BIE, Wei LI, Tao CHEN, Longmei NAN, Danyang YANG  Clicked:7245  Download:8903  Cited:0  <Full Text>  <PPT> 1166
Frontiers of Information Technology & Electronic Engineering  2022 Vol.23 No.1 P.134-144  DOI:10.1631/FITEE.2000325
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2025 Journal of Zhejiang University-SCIENCE