| index | Title |
| 16 | Efficient hierarchical identity based encryption scheme in the standard model over lattices Author(s):Feng-he Wang, Chun-xiao Wang, Zhen-hua Liu Clicked:9580 Download:4704 Cited:0 <Full Text> <PPT> 2585 Frontiers of Information Technology & Electronic Engineering 2016 Vol.17 No.8 P.781-791 DOI:10.1631/FITEE.1500219 |
| 17 | Chaotic digital cryptosystem using serial peripheral interface protocol and its dsPIC implementation Author(s):Rodrigo Méndez-Ramírez, Adrian Arellano-Delgado, César Cruz-Hernández, Fausto Abundiz-Pérez, Rigoberto Martínez-Clark Clicked:10488 Download:5021 Cited:0 <Full Text> <PPT> 2241 Frontiers of Information Technology & Electronic Engineering 2018 Vol.19 No.2 P.165-179 DOI:10.1631/FITEE.1601346 |
| 18 | High-payload completely reversible data hiding in encrypted images by an interpolation technique Author(s):Di Xiao, Ying Wang, Tao Xiang, Sen Bai Clicked:11289 Download:5147 Cited:0 <Full Text> <PPT> 2492 Frontiers of Information Technology & Electronic Engineering 2017 Vol.18 No.11 P.1732-1743 DOI:10.1631/FITEE.1601067 |
| 19 | A leakage-resilient certificateless public key encryption scheme with CCA2 security Author(s):Yan-wei Zhou, Bo Yang, Hao Cheng, Qing-long Wang Clicked:8878 Download:4218 Cited:0 <Full Text> <PPT> 2802 Frontiers of Information Technology & Electronic Engineering 2018 Vol.19 No.4 P.481-493 DOI:10.1631/FITEE.1601849 |
| 20 | Constructing pairing-free certificateless public key encryption with keyword search Author(s):Yang Lu, Ji-guo Li Clicked:8453 Download:4380 Cited:0 <Full Text> <PPT> 2316 Frontiers of Information Technology & Electronic Engineering 2019 Vol.20 No.8 P.1049-1060 DOI:10.1631/FITEE.1700534 |
| 21 | Generic user revocation systems for attribute-based encryption in cloud storage Author(s):Genlang Chen, Zhiqian Xu, Hai Jiang, Kuan-ching Li Clicked:9044 Download:4456 Cited:0 <Full Text> <PPT> 2803 Frontiers of Information Technology & Electronic Engineering 2018 Vol.19 No.11 P.1362-1384 DOI:10.1631/FITEE.1800405 |
| 22 | Survey of design and security evaluation of authenticated encryption algorithms in the CAESAR competition Author(s):Fan Zhang, Zi-yuan Liang, Bo-lin Yang, Xin-jie Zhao, Shi-ze Guo, Kui Ren Clicked:8882 Download:8063 Cited:0 <Full Text> <PPT> 2751 Frontiers of Information Technology & Electronic Engineering 2018 Vol.19 No.12 P.1475-1499 DOI:10.1631/FITEE.1800576 |
| 23 | Faster fog-aided private set intersection with integrity preserving Author(s):Qiang Wang, Fu-cai Zhou, Tie-min Ma, Zi-feng Xu Clicked:7030 Download:4477 Cited:0 <Full Text> <PPT> 2348 Frontiers of Information Technology & Electronic Engineering 2018 Vol.19 No.12 P.1558-1568 DOI:10.1631/FITEE.1800518 |
| 24 | Security for cyberspace: challenges and opportunities Author(s):Jiang-xing WU, Jian-hua LI, Xin-sheng JI Clicked:5615 Download:3929 Cited:0 <Full Text> Frontiers of Information Technology & Electronic Engineering 2018 Vol.19 No.12 P.1459-1461 DOI:10.1631/FITEE.1840000 |
| 25 | Generic attribute revocation systems for attribute-based encryption in cloud storage Author(s):Genlang Chen, Zhiqian Xu, Jia-jian Zhang, Guo-jun Wang, Hai Jiang, Miao-qing Huang Clicked:10114 Download:3952 Cited:0 <Full Text> <PPT> 2604 Frontiers of Information Technology & Electronic Engineering 2019 Vol.20 No.6 P.773-786 DOI:10.1631/FITEE.1800512 |
| 26 | Design and implementation of various datapath architectures for the ANU lightweight cipher on an FPGA Author(s):Vijay Dahiphale, Gaurav Bansod, Ankur Zambare, Narayan Pisharoty Clicked:8392 Download:4662 Cited:0 <Full Text> <PPT> 2290 Frontiers of Information Technology & Electronic Engineering 2020 Vol.21 No.4 P.615-628 DOI:10.1631/FITEE.1800681 |
| 27 | MULKASE: a novel approach for key-aggregate searchable encryption for multi-owner data Author(s):Mukti Padhya, Devesh C. Jinwala Clicked:9553 Download:4989 Cited:0 <Full Text> <PPT> 2242 Frontiers of Information Technology & Electronic Engineering 2019 Vol.20 No.12 P.1717-1748 DOI:10.1631/FITEE.1800192 |
| 28 | Dynamic analysis, FPGA implementation, and cryptographic application of an autonomous 5D chaotic system with offset boosting Author(s):Sifeu Takougang Kingni, Karthikeyan Rajagopal, Serdar Çiçek, Ashokkumar Srinivasan, Anitha Karthikeyan Clicked:10086 Download:9877 Cited:0 <Full Text> Frontiers of Information Technology & Electronic Engineering 2020 Vol.21 No.6 P.950-961 DOI:10.1631/FITEE.1900167 |
| 29 | A novel color image encryption algorithm based on a fractional-order discrete chaotic neural network and DNA sequence operations Author(s):Li-ping Chen, Hao Yin, Li-guo Yuan, António M. Lopes, J. A. Tenreiro Machado, Ran-chao Wu Clicked:8801 Download:11664 Cited:0 <Full Text> <PPT> 2526 Frontiers of Information Technology & Electronic Engineering 2020 Vol.21 No.6 P.866-879 DOI:10.1631/FITEE.1900709 |
| 30 | Discrete fractional watermark technique Author(s):Zai-rong Wang, Babak Shiri, Dumitru Baleanu Clicked:7781 Download:7397 Cited:0 <Full Text> <PPT> 2389 Frontiers of Information Technology & Electronic Engineering 2020 Vol.21 No.6 P.880-883 DOI:10.1631/FITEE.2000133 |
