Advanced Search



153 results found in all.
index Title
16Multipurpose audio watermarking algorithm
Author(s):Ning CHEN, Jie ZHU  Clicked:6453  Download:3551  Cited:5  <Full Text>
Journal of Zhejiang University Science A  2008 Vol.9 No.4 P.517-523  DOI:10.1631/jzus.A071493
17Integrated criteria for covert channel auditing
Author(s):Chang-da WANG, Shi-guang JU  Clicked:5504  Download:3606  Cited:0  <Full Text>
Journal of Zhejiang University Science A  2008 Vol.9 No.6 P.737-743  DOI:10.1631/jzus.A071510
18Cryptanalysis of an image encryption scheme based on the Hill cipher
Author(s):Cheng-qing LI, Dan ZHANG, Guan-rong CHEN  Clicked:6496  Download:4143  Cited:7  <Full Text>
Journal of Zhejiang University Science A  2008 Vol.9 No.8 P.1118-1123  DOI:10.1631/jzus.A0720102
19Improved Feistel-based ciphers for wireless sensor network security
Author(s):Tamara PAZYNYUK, Jian-zhong LI, George S. OREKU  Clicked:7533  Download:6199  Cited:1  <Full Text>
Journal of Zhejiang University Science A  2008 Vol.9 No.8 P.1111-1117  DOI:10.1631/jzus.A0720108
20Comments on “How to repair the Hill cipher”
Author(s):Y. RANGEL-ROMERO, R. VEGA-GARCÍA, A. MENCHACA-MÉNDEZ, D. ACOLTZI-CERVANTES, L. MARTÍNEZ-RAMOS, M. MECATE-ZAMBRANO, F. MONTALVO-LEZAMA, J. BARRÓN-VIDALES, N. CORTEZ-DUARTE, F. RODRÍGUEZ-HENRÍQUEZ  Clicked:6308  Download:4061  Cited:5  <Full Text>
Journal of Zhejiang University Science A  2008 Vol.9 No.2 P.211-214  DOI:10.1631/jzus.A072143
21Optimum allocation of FACTS devices in Fars Regional Electric Network using genetic algorithm based goal attainment
Author(s):Mohsen GITIZADEH, Mohsen KALANTAR  Clicked:8740  Download:4742  Cited:4  <Full Text>
Journal of Zhejiang University Science A  2009 Vol.10 No.4 P.478-487  DOI:10.1631/jzus.A0820130
22WAPN: a distributed wormhole attack detection approach for wireless sensor networks
Author(s):Fan-rui KONG, Chun-wen LI, Qing-qing DING, Guang-zhao CUI, Bing-yi CUI  Clicked:8431  Download:4344  Cited:5  <Full Text>
Journal of Zhejiang University Science A  2009 Vol.10 No.2 P.279-289  DOI:10.1631/jzus.A0820178
23Distributed anonymous data perturbation method for privacy-preserving data mining
Author(s):Feng LI, Jin MA, Jian-hua LI  Clicked:7010  Download:5395  Cited:3  <Full Text>
Journal of Zhejiang University Science A  2009 Vol.10 No.7 P.952-963  DOI:10.1631/jzus.A0820320
24Liquid film dryout model for predicting critical heat flux in annular two-phase flow
Author(s):Bo JIAO, Li-min QIU, Jun-liang LU, Zhi-hua GAN  Clicked:7821  Download:5252  Cited:8  <Full Text>
Journal of Zhejiang University Science A  2009 Vol.10 No.3 P.398-417  DOI:10.1631/jzus.A0820322
25Certificateless key-insulated signature without random oracles
Author(s):Zhong-mei WAN, Xue-jia LAI, Jian WENG, Sheng-li LIU, Yu LONG, Xuan HONG  Clicked:6324  Download:3718  Cited:8  <Full Text>
Journal of Zhejiang University Science A  2009 Vol.10 No.12 P.1790-1800  DOI:10.1631/jzus.A0820714
26A new protocol of wide use for e-mail with perfect forward secrecy
Author(s):Tzung-her CHEN, Yan-ting WU  Clicked:9093  Download:4633  Cited:1  <Full Text>
Journal of Zhejiang University Science C  2010 Vol.11 No.1 P.74-78  DOI:10.1631/jzus.A0910126
27Groundwater protection: What can we learn from Germany?
Author(s):Yan ZHU, Klaus-Dieter BALKE  Clicked:5576  Download:3268  Cited:3  <Full Text>
Journal of Zhejiang University Science B  2008 Vol.9 No.3 P.227-231  DOI:10.1631/jzus.B0710639
28Proactive worm propagation modeling and analysis in unstructured peer-to-peer networks
Author(s):Xiao-song ZHANG, Ting CHEN, Jiong ZHENG, Hua LI  Clicked:12954  Download:4892  Cited:8  <Full Text>
Journal of Zhejiang University Science C  2010 Vol.11 No.2 P.119-129  DOI:10.1631/jzus.C0910488
29Building a highly available and intrusion tolerant database security and protection system (DSPS)
Author(s):CAI Liang, YANG Xiao-hu, DONG Jin-xiang  Clicked:4623  Download:2812  Cited:0  <Full Text>
Journal of Zhejiang University Science  2003 Vol.4 No.3 P.287-293  DOI:10.1631/jzus.2003.0287
30Distributed heterogeneous inspecting system and its middleware-based solution
Author(s):HUANG Li-can, WU Zhao-hui, PAN Yun-he  Clicked:5575  Download:2811  Cited:0  <Full Text>
Journal of Zhejiang University Science  2003 Vol.4 No.5 P.542-548  DOI:10.1631/jzus.2003.0542
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2025 Journal of Zhejiang University-SCIENCE