Advanced Search



45 results found in all.
index Title
16Efficient hierarchical identity based encryption scheme in the standard model over lattices
Author(s):Feng-he Wang, Chun-xiao Wang, Zhen-hua Liu  Clicked:9580  Download:4704  Cited:0  <Full Text>  <PPT> 2585
Frontiers of Information Technology & Electronic Engineering  2016 Vol.17 No.8 P.781-791  DOI:10.1631/FITEE.1500219
17Chaotic digital cryptosystem using serial peripheral interface protocol and its dsPIC implementation
Author(s):Rodrigo Méndez-Ramírez, Adrian Arellano-Delgado, César Cruz-Hernández, Fausto Abundiz-Pérez, Rigoberto Martínez-Clark  Clicked:10488  Download:5021  Cited:0  <Full Text>  <PPT> 2241
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.2 P.165-179  DOI:10.1631/FITEE.1601346
18High-payload completely reversible data hiding in encrypted images by an interpolation technique
Author(s):Di Xiao, Ying Wang, Tao Xiang, Sen Bai  Clicked:11289  Download:5147  Cited:0  <Full Text>  <PPT> 2492
Frontiers of Information Technology & Electronic Engineering  2017 Vol.18 No.11 P.1732-1743  DOI:10.1631/FITEE.1601067
19A leakage-resilient certificateless public key encryption scheme with CCA2 security
Author(s):Yan-wei Zhou, Bo Yang, Hao Cheng, Qing-long Wang  Clicked:8878  Download:4218  Cited:0  <Full Text>  <PPT> 2802
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.4 P.481-493  DOI:10.1631/FITEE.1601849
20Constructing pairing-free certificateless public key encryption with keyword search
Author(s):Yang Lu, Ji-guo Li  Clicked:8453  Download:4380  Cited:0  <Full Text>  <PPT> 2316
Frontiers of Information Technology & Electronic Engineering  2019 Vol.20 No.8 P.1049-1060  DOI:10.1631/FITEE.1700534
21Generic user revocation systems for attribute-based encryption in cloud storage
Author(s):Genlang Chen, Zhiqian Xu, Hai Jiang, Kuan-ching Li  Clicked:9044  Download:4456  Cited:0  <Full Text>  <PPT> 2803
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.11 P.1362-1384  DOI:10.1631/FITEE.1800405
22Survey of design and security evaluation of authenticated encryption algorithms in the CAESAR competition
Author(s):Fan Zhang, Zi-yuan Liang, Bo-lin Yang, Xin-jie Zhao, Shi-ze Guo, Kui Ren  Clicked:8882  Download:8063  Cited:0  <Full Text>  <PPT> 2751
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.12 P.1475-1499  DOI:10.1631/FITEE.1800576
23Faster fog-aided private set intersection with integrity preserving
Author(s):Qiang Wang, Fu-cai Zhou, Tie-min Ma, Zi-feng Xu  Clicked:7030  Download:4477  Cited:0  <Full Text>  <PPT> 2348
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.12 P.1558-1568  DOI:10.1631/FITEE.1800518
24Security for cyberspace: challenges and opportunities
Author(s):Jiang-xing WU, Jian-hua LI, Xin-sheng JI  Clicked:5615  Download:3929  Cited:0  <Full Text>
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.12 P.1459-1461  DOI:10.1631/FITEE.1840000
25Generic attribute revocation systems for attribute-based encryption in cloud storage
Author(s):Genlang Chen, Zhiqian Xu, Jia-jian Zhang, Guo-jun Wang, Hai Jiang, Miao-qing Huang  Clicked:10114  Download:3952  Cited:0  <Full Text>  <PPT> 2604
Frontiers of Information Technology & Electronic Engineering  2019 Vol.20 No.6 P.773-786  DOI:10.1631/FITEE.1800512
26Design and implementation of various datapath architectures for the ANU lightweight cipher on an FPGA
Author(s):Vijay Dahiphale, Gaurav Bansod, Ankur Zambare, Narayan Pisharoty  Clicked:8392  Download:4662  Cited:0  <Full Text>  <PPT> 2290
Frontiers of Information Technology & Electronic Engineering  2020 Vol.21 No.4 P.615-628  DOI:10.1631/FITEE.1800681
27MULKASE: a novel approach for key-aggregate searchable encryption for multi-owner data
Author(s):Mukti Padhya, Devesh C. Jinwala  Clicked:9553  Download:4989  Cited:0  <Full Text>  <PPT> 2242
Frontiers of Information Technology & Electronic Engineering  2019 Vol.20 No.12 P.1717-1748  DOI:10.1631/FITEE.1800192
28Dynamic analysis, FPGA implementation, and cryptographic application of an autonomous 5D chaotic system with offset boosting
Author(s):Sifeu Takougang Kingni, Karthikeyan Rajagopal, Serdar Çiçek, Ashokkumar Srinivasan, Anitha Karthikeyan  Clicked:10086  Download:9877  Cited:0  <Full Text>
Frontiers of Information Technology & Electronic Engineering  2020 Vol.21 No.6 P.950-961  DOI:10.1631/FITEE.1900167
29A novel color image encryption algorithm based on a fractional-order discrete chaotic neural network and DNA sequence operations
Author(s):Li-ping Chen, Hao Yin, Li-guo Yuan, António M. Lopes, J. A. Tenreiro Machado, Ran-chao Wu  Clicked:8801  Download:11664  Cited:0  <Full Text>  <PPT> 2526
Frontiers of Information Technology & Electronic Engineering  2020 Vol.21 No.6 P.866-879  DOI:10.1631/FITEE.1900709
30Discrete fractional watermark technique
Author(s):Zai-rong Wang, Babak Shiri, Dumitru Baleanu  Clicked:7781  Download:7397  Cited:0  <Full Text>  <PPT> 2389
Frontiers of Information Technology & Electronic Engineering  2020 Vol.21 No.6 P.880-883  DOI:10.1631/FITEE.2000133
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2026 Journal of Zhejiang University-SCIENCE