Advanced Search



157 results found in all.
index Title
76A leakage-resilient certificateless public key encryption scheme with CCA2 security
Author(s):Yan-wei Zhou, Bo Yang, Hao Cheng, Qing-long Wang  Clicked:8885  Download:4221  Cited:0  <Full Text>  <PPT> 2803
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.4 P.481-493  DOI:10.1631/FITEE.1601849
77Millimeter-wave wireless communications for home network in fiber-to-the-room scenario
Author(s):Chao He, Zhixiong Ren, Xiang Wang, Yan Zeng, Jian Fang, Debin Hou, Le Kuai, Rong Lu, Shilin Yang, Zhe Chen, Jixin Chen  Clicked:10042  Download:10809  Cited:0  <Full Text>  <PPT> 3043
Frontiers of Information Technology & Electronic Engineering  2021 Vol.22 No.4 P.441-456  DOI:10.1631/FITEE.2000440
78NIG-AP: a new method for automated penetration testing
Author(s):Tian-yang Zhou, Yi-chao Zang, Jun-hu Zhu, Qing-xian Wang  Clicked:7272  Download:4934  Cited:0  <Full Text>  <PPT> 2259
Frontiers of Information Technology & Electronic Engineering  2019 Vol.20 No.9 P.1277-1288  DOI:10.1631/FITEE.1800532
79Enhancing security of NVM-based main memory with dynamic Feistel network mapping
Author(s):Fang-ting Huang, Dan Feng, Wen Xia, Wen Zhou, Yu-cheng Zhang, Min Fu, Chun-tao Jiang, Yu-kun Zhou  Clicked:10138  Download:4987  Cited:0  <Full Text>  <PPT> 2772
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.7 P.847-863  DOI:10.1631/FITEE.1601652
80Marine information technology: the best is yet to come
Author(s):Wen Xu, Yuan-liang Ma, Fumin Zhang, Daniel Rouseff, Fei Ji, Jun-hong Cui, Hussein Yahia  Clicked:8652  Download:3980  Cited:0  <Full Text>
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.8 P.947-950  DOI:10.1631/FITEE.1820000
81Stochastic stability analysis of networked control systems with random cryptographic protection under random zero-measurement attacks
Author(s):Meng-zhou Gao, Dong-qin Feng  Clicked:11308  Download:4582  Cited:0  <Full Text>  <PPT> 2634
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.9 P.1098-1111  DOI:10.1631/FITEE.1700334
82Low powered blockchain consensus protocols based on consistent hash
Author(s):Lei Yu, Xiao-fang Zhao, Yan Jin, Heng-yi Cai, Bo Wei, Bin Hu  Clicked:8869  Download:4521  Cited:0  <Full Text>  <PPT> 2690
Frontiers of Information Technology & Electronic Engineering  2019 Vol.20 No.10 P.1361-1377  DOI:10.1631/FITEE.1800119
83Cyber security meets artificial intelligence: a survey
Author(s):Jian-hua Li  Clicked:9455  Download:5226  Cited:0  <Full Text>  <PPT> 2897
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.12 P.1462-1474  DOI:10.1631/FITEE.1800573
84Novel architectures and security solutions of programmable software-defined networking: a comprehensive survey
Author(s):Shen Wang, Jun Wu, Wu Yang, Long-hua Guo  Clicked:7919  Download:3837  Cited:0  <Full Text>  <PPT> 2367
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.12 P.1500-1521  DOI:10.1631/FITEE.1800575
85Survey of design and security evaluation of authenticated encryption algorithms in the CAESAR competition
Author(s):Fan Zhang, Zi-yuan Liang, Bo-lin Yang, Xin-jie Zhao, Shi-ze Guo, Kui Ren  Clicked:8891  Download:8066  Cited:0  <Full Text>  <PPT> 2751
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.12 P.1475-1499  DOI:10.1631/FITEE.1800576
86Faster fog-aided private set intersection with integrity preserving
Author(s):Qiang Wang, Fu-cai Zhou, Tie-min Ma, Zi-feng Xu  Clicked:7033  Download:4481  Cited:0  <Full Text>  <PPT> 2348
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.12 P.1558-1568  DOI:10.1631/FITEE.1800518
87Security for cyberspace: challenges and opportunities
Author(s):Jiang-xing WU, Jian-hua LI, Xin-sheng JI  Clicked:5617  Download:3932  Cited:0  <Full Text>
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.12 P.1459-1461  DOI:10.1631/FITEE.1840000
88Safe navigation of quadrotors with jerk limited trajectory
Author(s):Shu-peng Lai, Meng-lu Lan, Ya-xuan Li, Ben M. Chen  Clicked:8179  Download:4694  Cited:0  <Full Text>  <PPT> 2722
Frontiers of Information Technology & Electronic Engineering  2019 Vol.20 No.1 P.107-119  DOI:10.1631/FITEE.1800719
89Design and implementation of a novel enterprise network defense system by maneuvering multi-dimensional network properties
Author(s):Yang Chen, Hong-chao HU, Guo-zhen Cheng  Clicked:11055  Download:4649  Cited:0  <Full Text>  <PPT> 2834
Frontiers of Information Technology & Electronic Engineering  2019 Vol.20 No.2 P.238-252  DOI:10.1631/FITEE.1800516
90A secure data sharing scheme with cheating detection based on Chaum-Pedersen protocol for cloud storage
Author(s):Xin Wang, Bo Yang, Zhe Xia, Hong-xia Hou  Clicked:10240  Download:4260  Cited:0  <Full Text>  <PPT> 2560
Frontiers of Information Technology & Electronic Engineering  2019 Vol.20 No.6 P.787-800  DOI:10.1631/FITEE.1800066
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2026 Journal of Zhejiang University-SCIENCE