Advanced Search



45 results found in all.
index Title
31Bio-inspired cryptosystem on the reciprocal domain: DNA strands mutate to secure health data
Author(s):S. Aashiq Banu, Rengarajan Amirtharajan  Clicked:8915  Download:8039  Cited:0  <Full Text>  <PPT> 2607
Frontiers of Information Technology & Electronic Engineering  2021 Vol.22 No.7 P.940-956  DOI:10.1631/FITEE.2000071
32Identity-based threshold proxy re-encryption scheme from lattices and its applications
Author(s):Liqiang WU, Yiliang HAN, Xiaoyuan YANG, Minqing ZHANG  Clicked:9122  Download:14443  Cited:0  <Full Text>  <PPT> 1411
Frontiers of Information Technology & Electronic Engineering  2022 Vol.23 No.2 P.258-277  DOI:10.1631/FITEE.2000366
33Verifier-local revocation group signatures with backward unlinkability from lattices
Author(s):Yanhua ZHANG, Ximeng LIU, Yupu HU, Yong GAN, Huiwen JIA  Clicked:9420  Download:12024  Cited:0  <Full Text>  <PPT> 1310
Frontiers of Information Technology & Electronic Engineering  2022 Vol.23 No.6 P.876-892  DOI:10.1631/FITEE.2000507
34An energy-efficient reconfigurable asymmetric modular cryptographic operation unit for RSA and ECC
Author(s):Mengni BIE, Wei LI, Tao CHEN, Longmei NAN, Danyang YANG  Clicked:9791  Download:11359  Cited:0  <Full Text>  <PPT> 1780
Frontiers of Information Technology & Electronic Engineering  2022 Vol.23 No.1 P.134-144  DOI:10.1631/FITEE.2000325
35A joint image compression and encryption scheme based on a novel coupled map lattice system and DNA operations
Author(s):Yuanyuan LI, Xiaoqing YOU, Jianquan LU, Jungang LOU  Clicked:4002  Download:7948  Cited:0  <Full Text>  <PPT> 1014
Frontiers of Information Technology & Electronic Engineering  2023 Vol.24 No.6 P.813-827  DOI:10.1631/FITEE.2200645
36A novel hybrid cryptosystem based on DQFrFT watermarking and 3D-CLM encryption for healthcare services
Author(s):Fatma KHALLAF, Walid EL-SHAFAI, El-Sayed M. EL-RABAIE, Naglaa F. SOLIMAN, Fathi E. Abd EL-SAMIE  Clicked:4706  Download:10820  Cited:0  <Full Text>  <PPT> 1181
Frontiers of Information Technology & Electronic Engineering  2023 Vol.24 No.7 P.1045-1061  DOI:10.1631/FITEE.2200372
37TPE-H2MWD: an exact thumbnail preserving encryption scheme with hidden Markov model and weighted diffusion
Author(s):Xiuli CHAI, Xiuhui CHEN, Yakun MA, Fang ZUO, Zhihua GAN, Yushu ZHANG  Clicked:4718  Download:5356  Cited:0  <Full Text>  <PPT> 1236
Frontiers of Information Technology & Electronic Engineering  2023 Vol.24 No.8 P.1169-1180  DOI:10.1631/FITEE.2200498
38Reinforcement learning based privacy-preserving consensus tracking control of nonstrict-feedback discrete-time multi-agent systems
Author(s):Yang YANG, Fanming HUANG, Dong YUE  Clicked:3319  Download:4850  Cited:0  <Full Text>  <PPT> 742
Frontiers of Information Technology & Electronic Engineering  2025 Vol.26 No.3 P.456-471  DOI:10.1631/FITEE.2300532
39Reversible data hiding scheme for encrypted JPEG bitstreams using adaptive RZL rotation
Author(s):Yongning GUO, Guodong SU, Zhiqiang YAO, Wang ZHOU  Clicked:3408  Download:2636  Cited:0  <Full Text>  <PPT> 837
Frontiers of Information Technology & Electronic Engineering  2024 Vol.25 No.10 P.1353-1369  DOI:10.1631/FITEE.2300749
40Reversible data hiding in encrypted images based on additive secret sharing and additive joint coding using an intelligent predictor
Author(s):Ziyi ZHOU, Chengyue WANG, Kexun YAN, Hui SHI, Xin PANG  Clicked:3769  Download:2820  Cited:0  <Full Text>  <PPT> 811
Frontiers of Information Technology & Electronic Engineering  2024 Vol.25 No.9 P.1250-1265  DOI:10.1631/FITEE.2300750
41A geographic information encryption system based on Chaos-LSTM and chaos sequence proliferation
Author(s):Jia DUAN, Luanyun HU, Qiumei XIAO, Meiting LIU, Wenxin YU  Clicked:4199  Download:4852  Cited:0  <Full Text>
Frontiers of Information Technology & Electronic Engineering  2025 Vol.26 No.3 P.427-440  DOI:10.1631/FITEE.2300755
42Efficient privacy-preserving scheme for secure neural network inference
Author(s):Liquan CHEN, Zixuan YANG, Peng ZHANG, Yang MA  Clicked:2189  Download:4696  Cited:0  <Full Text>  <PPT> 529
Frontiers of Information Technology & Electronic Engineering  2025 Vol.26 No.9 P.1609-1623  DOI:10.1631/FITEE.2400371
43SPJEU: a self-sufficient plaintext-related JPEG image encryption scheme based on a unified key
Author(s):Ming LI, Wenwen ZHOU, Mengdie WANG, Yushu ZHANG, Yong XIANG  Clicked:2177  Download:4417  Cited:0  <Full Text>
Frontiers of Information Technology & Electronic Engineering  2025 Vol.26 No.6 P.847-861  DOI:10.1631/FITEE.2400721
44Reversible data hiding in encrypted domain based on NTRU and Chinese remainder theorem
Author(s):Xinyue ZHANG, Kunyi LAI, Xin TANG  Clicked:388  Download:180  Cited:0  <Full Text>
Journal of Zhejiang University Science  2026 Vol.27 No.4 P.1-10  DOI:10.1631/ENG.ITEE.2025.0138
45Dynamics of a two-disk dynamo loaded with a dual neuron circuit and its application
Author(s):Fuqiang WU1,2, Ying XU3, Huimin QI1, Jun MA4  Clicked:8  Download:4  Cited:0  <Full Text>
Journal of Zhejiang University Science A  In Press    DOI:
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2026 Journal of Zhejiang University-SCIENCE