| index | Title |
| 76 | A leakage-resilient certificateless public key encryption scheme with CCA2 security Author(s):Yan-wei Zhou, Bo Yang, Hao Cheng, Qing-long Wang Clicked:8885 Download:4221 Cited:0 <Full Text> <PPT> 2803 Frontiers of Information Technology & Electronic Engineering 2018 Vol.19 No.4 P.481-493 DOI:10.1631/FITEE.1601849 |
| 77 | Millimeter-wave wireless communications for home network in fiber-to-the-room scenario Author(s):Chao He, Zhixiong Ren, Xiang Wang, Yan Zeng, Jian Fang, Debin Hou, Le Kuai, Rong Lu, Shilin Yang, Zhe Chen, Jixin Chen Clicked:10042 Download:10809 Cited:0 <Full Text> <PPT> 3043 Frontiers of Information Technology & Electronic Engineering 2021 Vol.22 No.4 P.441-456 DOI:10.1631/FITEE.2000440 |
| 78 | NIG-AP: a new method for automated penetration testing Author(s):Tian-yang Zhou, Yi-chao Zang, Jun-hu Zhu, Qing-xian Wang Clicked:7272 Download:4934 Cited:0 <Full Text> <PPT> 2259 Frontiers of Information Technology & Electronic Engineering 2019 Vol.20 No.9 P.1277-1288 DOI:10.1631/FITEE.1800532 |
| 79 | Enhancing security of NVM-based main memory with dynamic Feistel network mapping Author(s):Fang-ting Huang, Dan Feng, Wen Xia, Wen Zhou, Yu-cheng Zhang, Min Fu, Chun-tao Jiang, Yu-kun Zhou Clicked:10138 Download:4987 Cited:0 <Full Text> <PPT> 2772 Frontiers of Information Technology & Electronic Engineering 2018 Vol.19 No.7 P.847-863 DOI:10.1631/FITEE.1601652 |
| 80 | Marine information technology: the best is yet to come Author(s):Wen Xu, Yuan-liang Ma, Fumin Zhang, Daniel Rouseff, Fei Ji, Jun-hong Cui, Hussein Yahia Clicked:8652 Download:3980 Cited:0 <Full Text> Frontiers of Information Technology & Electronic Engineering 2018 Vol.19 No.8 P.947-950 DOI:10.1631/FITEE.1820000 |
| 81 | Stochastic stability analysis of networked control systems with random cryptographic protection under random zero-measurement attacks Author(s):Meng-zhou Gao, Dong-qin Feng Clicked:11308 Download:4582 Cited:0 <Full Text> <PPT> 2634 Frontiers of Information Technology & Electronic Engineering 2018 Vol.19 No.9 P.1098-1111 DOI:10.1631/FITEE.1700334 |
| 82 | Low powered blockchain consensus protocols based on consistent hash Author(s):Lei Yu, Xiao-fang Zhao, Yan Jin, Heng-yi Cai, Bo Wei, Bin Hu Clicked:8869 Download:4521 Cited:0 <Full Text> <PPT> 2690 Frontiers of Information Technology & Electronic Engineering 2019 Vol.20 No.10 P.1361-1377 DOI:10.1631/FITEE.1800119 |
| 83 | Cyber security meets artificial intelligence: a survey Author(s):Jian-hua Li Clicked:9455 Download:5226 Cited:0 <Full Text> <PPT> 2897 Frontiers of Information Technology & Electronic Engineering 2018 Vol.19 No.12 P.1462-1474 DOI:10.1631/FITEE.1800573 |
| 84 | Novel architectures and security solutions of programmable software-defined networking: a comprehensive survey Author(s):Shen Wang, Jun Wu, Wu Yang, Long-hua Guo Clicked:7919 Download:3837 Cited:0 <Full Text> <PPT> 2367 Frontiers of Information Technology & Electronic Engineering 2018 Vol.19 No.12 P.1500-1521 DOI:10.1631/FITEE.1800575 |
| 85 | Survey of design and security evaluation of authenticated encryption algorithms in the CAESAR competition Author(s):Fan Zhang, Zi-yuan Liang, Bo-lin Yang, Xin-jie Zhao, Shi-ze Guo, Kui Ren Clicked:8891 Download:8066 Cited:0 <Full Text> <PPT> 2751 Frontiers of Information Technology & Electronic Engineering 2018 Vol.19 No.12 P.1475-1499 DOI:10.1631/FITEE.1800576 |
| 86 | Faster fog-aided private set intersection with integrity preserving Author(s):Qiang Wang, Fu-cai Zhou, Tie-min Ma, Zi-feng Xu Clicked:7033 Download:4481 Cited:0 <Full Text> <PPT> 2348 Frontiers of Information Technology & Electronic Engineering 2018 Vol.19 No.12 P.1558-1568 DOI:10.1631/FITEE.1800518 |
| 87 | Security for cyberspace: challenges and opportunities Author(s):Jiang-xing WU, Jian-hua LI, Xin-sheng JI Clicked:5617 Download:3932 Cited:0 <Full Text> Frontiers of Information Technology & Electronic Engineering 2018 Vol.19 No.12 P.1459-1461 DOI:10.1631/FITEE.1840000 |
| 88 | Safe navigation of quadrotors with jerk limited trajectory Author(s):Shu-peng Lai, Meng-lu Lan, Ya-xuan Li, Ben M. Chen Clicked:8179 Download:4694 Cited:0 <Full Text> <PPT> 2722 Frontiers of Information Technology & Electronic Engineering 2019 Vol.20 No.1 P.107-119 DOI:10.1631/FITEE.1800719 |
| 89 | Design and implementation of a novel enterprise network defense system by maneuvering multi-dimensional network properties Author(s):Yang Chen, Hong-chao HU, Guo-zhen Cheng Clicked:11055 Download:4649 Cited:0 <Full Text> <PPT> 2834 Frontiers of Information Technology & Electronic Engineering 2019 Vol.20 No.2 P.238-252 DOI:10.1631/FITEE.1800516 |
| 90 | A secure data sharing scheme with cheating detection based on Chaum-Pedersen protocol for cloud storage Author(s):Xin Wang, Bo Yang, Zhe Xia, Hong-xia Hou Clicked:10240 Download:4260 Cited:0 <Full Text> <PPT> 2560 Frontiers of Information Technology & Electronic Engineering 2019 Vol.20 No.6 P.787-800 DOI:10.1631/FITEE.1800066 |
