Advanced Search



153 results found in all.
index Title
31A MUTUAL NON-REPUDIATION PROTOCOL WITH PRIVACY
Author(s):JIANG Xiao-ning, YE Cheng-qing  Clicked:5324  Download:2927  Cited:0  <Full Text>
Journal of Zhejiang University Science  2000 Vol.1 No.3 P.317-321  DOI:10.1631/jzus.2000.0317
32A novel multisignature scheme for a special verifier group against clerk and rogue-key attacks
Author(s):Jia-lun Tsai, Tzong-chen Wu, Kuo-yu Tsai  Clicked:9272  Download:3546  Cited:1  <Full Text>
Journal of Zhejiang University Science C  2010 Vol.11 No.4 P.290-295  DOI:10.1631/jzus.C0910457
33Untraceable partially blind signature based on DLOG problem
Author(s):HUANG Zheng, CHEN Ke-fei, KOU Wei-dong  Clicked:5427  Download:2967  Cited:3  <Full Text>
Journal of Zhejiang University Science  2004 Vol.5 No.1 P.40-44  DOI:10.1631/jzus.2004.0040
34Verifiable threshold signature schemes against conspiracy attack
Author(s):GAN Yuan-ju  Clicked:5550  Download:3449  Cited:0  <Full Text>
Journal of Zhejiang University Science  2004 Vol.5 No.1 P.50-54  DOI:10.1631/jzus.2004.0050
35A reference model for database security proxy
Author(s):CAI Liang, YANG Xiao-hu, DONG Jin-xiang  Clicked:5006  Download:2949  Cited:0  <Full Text>
Journal of Zhejiang University Science  2002 Vol.3 No.1 P.30-36  DOI:10.1631/jzus.2002.0030
36Estimation of financial loss ratio for E-insurance: a quantitative model
Author(s):ZHONG Yuan-sheng, CHEN De-ren, SHI Min-hua  Clicked:4593  Download:2848  Cited:0  <Full Text>
Journal of Zhejiang University Science  2002 Vol.3 No.2 P.140-147  DOI:10.1631/jzus.2002.0140
37A new asymmetric watermarking scheme based on a real fractional DCT-I transform
Author(s):Gui Guo-fu, Jiang Ling-ge, He Chen  Clicked:5893  Download:2851  Cited:1  <Full Text>
Journal of Zhejiang University Science A  2006 Vol.7 No.3 P.285-288  DOI:10.1631/jzus.2006.A0285
38Minimal role mining method for Web service composition
Author(s):Chao Huang, Jian-ling Sun, Xin-yu Wang, Yuan-jie Si  Clicked:8895  Download:3444  Cited:4  <Full Text>
Journal of Zhejiang University Science C  2010 Vol.11 No.5 P.328-339  DOI:10.1631/jzus.C0910186
39A fine-grained access control model for relational databases
Author(s):Jie Shi, Hong Zhu  Clicked:9125  Download:3922  Cited:6  <Full Text>
Journal of Zhejiang University Science C  2010 Vol.11 No.8 P.575-586  DOI:10.1631/jzus.C0910466
40Quasi-distributed sensing network based on coherence multiplexing and spatial division multiplexing for coal mine security monitoring
Author(s):Tian-hao Xia, Wei-sheng Liu, Bin Zhou, Bo-bo Gu, Chun-sheng Yan  Clicked:9606  Download:3304  Cited:0  <Full Text>
Journal of Zhejiang University Science C  2010 Vol.11 No.10 P.762-766  DOI:10.1631/jzus.C0910716
41Efficient password authentication schemes based on a geometric approach for a multi-server environment
Author(s):Horng-Twu Liaw, Chih-Ta Yen, Meng-Yu Chiu, Li-Lin Hsiao  Clicked:8448  Download:3073  Cited:1  <Full Text>
Journal of Zhejiang University Science C  2010 Vol.11 No.12 P.989-997  DOI:10.1631/jzus.C0910712
42A three-level authenticated conference key establishment protocol for UMTS networks
Author(s):Chung-Fu Lu, Tzong-Chen Wu, Chien-Lung Hsu  Clicked:8320  Download:3809  Cited:1  <Full Text>
Journal of Zhejiang University Science C  2011 Vol.12 No.5 P.371-378  DOI:10.1631/jzus.C1000194
43An efficient and DoS-resistant user authentication scheme for two-tiered wireless sensor networks
Author(s):Rong FAN, Dao-jing HE, Xue-zeng PAN, Ling-di PING  Clicked:11325  Download:6510  Cited:17  <Full Text>
Journal of Zhejiang University Science C  2011 Vol.12 No.7 P.550-560  DOI:10.1631/jzus.C1000377
44CCA2 secure biometric identity based encryption with constant-size ciphertext
Author(s):Yang Yang, Yu-pu Hu, Le-you Zhang, Chun-hui Sun  Clicked:9297  Download:4044  Cited:1  <Full Text>
Journal of Zhejiang University Science C  2011 Vol.12 No.10 P.819-827  DOI:10.1631/jzus.C1000429
45Efficient revocation in ciphertext-policy attribute-based encryption based cryptographic cloud storage
Author(s):Yong Cheng, Zhi-ying Wang, Jun Ma, Jiang-jiang Wu, Song-zhu Mei, Jiang-chun Ren  Clicked:11494  Download:8765  Cited:14  <Full Text>
Journal of Zhejiang University Science C  2013 Vol.14 No.2 P.85-97  DOI:10.1631/jzus.C1200240
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2025 Journal of Zhejiang University-SCIENCE