Advanced Search



157 results found in all.
index Title
46A 10 Gbps in-line network security processor based on configurable hetero-multi-cores
Author(s):Yun Niu, Li-ji Wu, Yang Liu, Xiang-min Zhang, Hong-yi Chen  Clicked:10747  Download:4669  Cited:2  <Full Text>  <PPT> 3009
Journal of Zhejiang University Science C  2013 Vol.14 No.8 P.642-651  DOI:10.1631/jzus.C1200370
47Analysis and design of a smart card based authentication protocol
Author(s):Kuo-Hui Yeh, Kuo-Yu Tsai, Jia-Li Hou  Clicked:10278  Download:4803  Cited:0  <Full Text>  <PPT> 2609
Journal of Zhejiang University Science C  2013 Vol.14 No.12 P.909-917  DOI:10.1631/jzus.C1300158
48An in-situ slurry fracturing test for slurry shield tunneling
Author(s):Xue-yan Liu, Da-jun Yuan  Clicked:14053  Download:4919  Cited:3  <Full Text>  <PPT> 2961
Journal of Zhejiang University Science A  2014 Vol.15 No.7 P.465-481  DOI:10.1631/jzus.A1400028
49Performance study of selective encryption in comparison to full encryption for still visual images
Author(s):Osama A. Khashan, Abdullah M. Zin, Elankovan A. Sundararajan  Clicked:11675  Download:5367  Cited:6  <Full Text>  <PPT> 2829
Journal of Zhejiang University Science C  2014 Vol.15 No.6 P.435-444  DOI:10.1631/jzus.C1300262
50NaEPASC: a novel and efficient public auditing scheme for cloud data
Author(s):Shuang Tan, Yan Jia  Clicked:12685  Download:9565  Cited:7  <Full Text>  <PPT> 3128
Journal of Zhejiang University Science C  2014 Vol.15 No.9 P.794-804  DOI:10.1631/jzus.C1400045
51Botnet detection techniques: review, future trends, and issues
Author(s):Ahmad Karim, Rosli Bin Salleh, Muhammad Shiraz, Syed Adeel Ali Shah, Irfan Awan, Nor Badrul Anuar  Clicked:23114  Download:27279  Cited:10  <Full Text>  <PPT> 3748
Journal of Zhejiang University Science C  2014 Vol.15 No.11 P.943-983  DOI:10.1631/jzus.C1300242
52Performance improvement for applying network virtualization in fiber-wireless (FiWi) access networks
Author(s):Qing-long Dai, Guo-chu Shou, Yi-hong Hu, Zhi-gang Guo  Clicked:9580  Download:4577  Cited:3  <Full Text>  <PPT> 2943
Journal of Zhejiang University Science C  2014 Vol.15 No.11 P.1058-1070  DOI:10.1631/jzus.C1400044
53ImgFS: a transparent cryptography for stored images using a filesystem in userspace
Author(s):Osama A. Khashan, Abdullah M. Zin, Elankovan A. Sundararajan  Clicked:9199  Download:5064  Cited:0  <Full Text>  <PPT> 3139
Frontiers of Information Technology & Electronic Engineering  2015 Vol.16 No.1 P.28-42  DOI:10.1631/FITEE.1400133
54Moving target defense: state of the art and characteristics
Author(s):Gui-lin CAI, Bao-sheng WANG, Wei HU, Tian-zuo WANG  Clicked:9723  Download:7235  Cited:1  <Full Text>  <PPT> 2748
Frontiers of Information Technology & Electronic Engineering  2016 Vol.17 No.11 P.1122-1153  DOI:10.1631/FITEE.1601321
55A lightweight authentication scheme with user untraceability
Author(s):Kuo-Hui Yeh  Clicked:10814  Download:4818  Cited:2  <Full Text>  <PPT> 2966
Frontiers of Information Technology & Electronic Engineering  2015 Vol.16 No.4 P.259-271  DOI:10.1631/FITEE.1400232
56A hybrid short-term load forecasting method based on improved ensemble empirical mode decomposition and back propagation neural network
Author(s):Yun-luo Yu, Wei Li, De-ren Sheng, Jian-hong Chen  Clicked:7914  Download:4940  Cited:1  <Full Text>  <PPT> 3218
Journal of Zhejiang University Science A  2016 Vol.17 No.2 P.101-114  DOI:10.1631/jzus.A1500156
57Discovering optimal features using static analysis and a genetic search based method for Android malware detection
Author(s):Ahmad Firdaus, Nor Badrul Anuar, Ahmad Karim, Mohd Faizal Ab Razak  Clicked:11473  Download:6189  Cited:0  <Full Text>  <PPT> 2601
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.6 P.712-736  DOI:10.1631/FITEE.1601491
58A numerical study on the high-velocity impact behavior of pressure pipes
Author(s):Zhen-yu Wang, Yang Zhao, Guo-wei Ma, Zhi-guo He  Clicked:7334  Download:5232  Cited:1  <Full Text>  <PPT> 2902
Journal of Zhejiang University Science A  2016 Vol.17 No.6 P.443-453  DOI:10.1631/jzus.A1500112
59BORON: an ultra-lightweight and low power encryption design for pervasive computing
Author(s):Gaurav Bansod, Narayan Pisharoty, Abhijit Patil  Clicked:9527  Download:6278  Cited:0  <Full Text>
Frontiers of Information Technology & Electronic Engineering  2017 Vol.18 No.3 P.317-331  DOI:10.1631/FITEE.1500415
60Anonymous-address-resolution model
Author(s):Guang-jia Song, Zhen-zhou Ji  Clicked:9301  Download:5059  Cited:0  <Full Text>  <PPT> 2716
Frontiers of Information Technology & Electronic Engineering  2016 Vol.17 No.10 P.1044-1055  DOI:10.1631/FITEE.1500382
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2026 Journal of Zhejiang University-SCIENCE