Advanced Search



153 results found in all.
index Title
76A leakage-resilient certificateless public key encryption scheme with CCA2 security
Author(s):Yan-wei Zhou, Bo Yang, Hao Cheng, Qing-long Wang  Clicked:7174  Download:2856  Cited:0  <Full Text>  <PPT> 2230
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.4 P.481-493  DOI:10.1631/FITEE.1601849
77Millimeter-wave wireless communications for home network in fiber-to-the-room scenario
Author(s):Chao He, Zhixiong Ren, Xiang Wang, Yan Zeng, Jian Fang, Debin Hou, Le Kuai, Rong Lu, Shilin Yang, Zhe Chen, Jixin Chen  Clicked:7552  Download:8003  Cited:0  <Full Text>  <PPT> 2513
Frontiers of Information Technology & Electronic Engineering  2021 Vol.22 No.4 P.441-456  DOI:10.1631/FITEE.2000440
78NIG-AP: a new method for automated penetration testing
Author(s):Tian-yang Zhou, Yi-chao Zang, Jun-hu Zhu, Qing-xian Wang  Clicked:6087  Download:3128  Cited:0  <Full Text>  <PPT> 1695
Frontiers of Information Technology & Electronic Engineering  2019 Vol.20 No.9 P.1277-1288  DOI:10.1631/FITEE.1800532
79Enhancing security of NVM-based main memory with dynamic Feistel network mapping
Author(s):Fang-ting Huang, Dan Feng, Wen Xia, Wen Zhou, Yu-cheng Zhang, Min Fu, Chun-tao Jiang, Yu-kun Zhou  Clicked:8370  Download:3287  Cited:0  <Full Text>  <PPT> 2251
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.7 P.847-863  DOI:10.1631/FITEE.1601652
80Marine information technology: the best is yet to come
Author(s):Wen Xu, Yuan-liang Ma, Fumin Zhang, Daniel Rouseff, Fei Ji, Jun-hong Cui, Hussein Yahia  Clicked:7448  Download:2446  Cited:0  <Full Text>
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.8 P.947-950  DOI:10.1631/FITEE.1820000
81Stochastic stability analysis of networked control systems with random cryptographic protection under random zero-measurement attacks
Author(s):Meng-zhou Gao, Dong-qin Feng  Clicked:10046  Download:3168  Cited:0  <Full Text>  <PPT> 2195
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.9 P.1098-1111  DOI:10.1631/FITEE.1700334
82Low powered blockchain consensus protocols based on consistent hash
Author(s):Lei Yu, Xiao-fang Zhao, Yan Jin, Heng-yi Cai, Bo Wei, Bin Hu  Clicked:7318  Download:2992  Cited:0  <Full Text>  <PPT> 2275
Frontiers of Information Technology & Electronic Engineering  2019 Vol.20 No.10 P.1361-1377  DOI:10.1631/FITEE.1800119
83Cyber security meets artificial intelligence: a survey
Author(s):Jian-hua Li  Clicked:8050  Download:3725  Cited:0  <Full Text>  <PPT> 2303
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.12 P.1462-1474  DOI:10.1631/FITEE.1800573
84Novel architectures and security solutions of programmable software-defined networking: a comprehensive survey
Author(s):Shen Wang, Jun Wu, Wu Yang, Long-hua Guo  Clicked:6046  Download:2203  Cited:0  <Full Text>  <PPT> 1973
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.12 P.1500-1521  DOI:10.1631/FITEE.1800575
85Survey of design and security evaluation of authenticated encryption algorithms in the CAESAR competition
Author(s):Fan Zhang, Zi-yuan Liang, Bo-lin Yang, Xin-jie Zhao, Shi-ze Guo, Kui Ren  Clicked:6831  Download:5172  Cited:0  <Full Text>  <PPT> 2388
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.12 P.1475-1499  DOI:10.1631/FITEE.1800576
86Faster fog-aided private set intersection with integrity preserving
Author(s):Qiang Wang, Fu-cai Zhou, Tie-min Ma, Zi-feng Xu  Clicked:5645  Download:2912  Cited:0  <Full Text>  <PPT> 1904
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.12 P.1558-1568  DOI:10.1631/FITEE.1800518
87Security for cyberspace: challenges and opportunities
Author(s):Jiang-xing WU, Jian-hua LI, Xin-sheng JI  Clicked:4437  Download:2474  Cited:0  <Full Text>
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.12 P.1459-1461  DOI:10.1631/FITEE.1840000
88Safe navigation of quadrotors with jerk limited trajectory
Author(s):Shu-peng Lai, Meng-lu Lan, Ya-xuan Li, Ben M. Chen  Clicked:6264  Download:3292  Cited:0  <Full Text>  <PPT> 2267
Frontiers of Information Technology & Electronic Engineering  2019 Vol.20 No.1 P.107-119  DOI:10.1631/FITEE.1800719
89Design and implementation of a novel enterprise network defense system by maneuvering multi-dimensional network properties
Author(s):Yang Chen, Hong-chao HU, Guo-zhen Cheng  Clicked:9018  Download:3142  Cited:0  <Full Text>  <PPT> 2424
Frontiers of Information Technology & Electronic Engineering  2019 Vol.20 No.2 P.238-252  DOI:10.1631/FITEE.1800516
90A secure data sharing scheme with cheating detection based on Chaum-Pedersen protocol for cloud storage
Author(s):Xin Wang, Bo Yang, Zhe Xia, Hong-xia Hou  Clicked:8858  Download:2701  Cited:0  <Full Text>  <PPT> 2088
Frontiers of Information Technology & Electronic Engineering  2019 Vol.20 No.6 P.787-800  DOI:10.1631/FITEE.1800066
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2025 Journal of Zhejiang University-SCIENCE