| index | Title |
| 1 | Optimizing storage performance in public cloud platforms Author(s):Jian-zong Wang, Peter Varman, Chang-sheng Xie Clicked:11695 Download:5600 Cited:6 <Full Text> Journal of Zhejiang University Science C 2011 Vol.12 No.12 P.951-964 DOI:10.1631/jzus.C1100097 |
| 2 | Efficient revocation in ciphertext-policy attribute-based encryption based cryptographic cloud storage Author(s):Yong Cheng, Zhi-ying Wang, Jun Ma, Jiang-jiang Wu, Song-zhu Mei, Jiang-chun Ren Clicked:12864 Download:10209 Cited:14 <Full Text> Journal of Zhejiang University Science C 2013 Vol.14 No.2 P.85-97 DOI:10.1631/jzus.C1200240 |
| 3 | NaEPASC: a novel and efficient public auditing scheme for cloud data Author(s):Shuang Tan, Yan Jia Clicked:12677 Download:9551 Cited:7 <Full Text> <PPT> 3125 Journal of Zhejiang University Science C 2014 Vol.15 No.9 P.794-804 DOI:10.1631/jzus.C1400045 |
| 4 | Analyzing the service availability of mobile cloud computing systems by fluid-flow approximation Author(s):Hong-wu Lv, Jun-yu Lin, Hui-qiang Wang, Guang-sheng Feng, Mo Zhou Clicked:10251 Download:4458 Cited:2 <Full Text> <PPT> 2987 Frontiers of Information Technology & Electronic Engineering 2015 Vol.16 No.7 P.553-567 DOI:10.1631/FITEE.1400410 |
| 5 | Cryptanalysis of an identity-based public auditing protocol for cloud storage Author(s):Li-bing Wu, Jing Wang, De-biao He, Muhammad-Khurram Khan Clicked:10244 Download:4562 Cited:0 <Full Text> <PPT> 3042 Frontiers of Information Technology & Electronic Engineering 2017 Vol.18 No.12 P.1972-1977 DOI:10.1631/FITEE.1601530 |
| 6 | Post-exascale supercomputing: research opportunities abound Author(s):Zuo-ning Chen, Jack Dongarra, Zhi-wei Xu Clicked:7375 Download:4522 Cited:0 <Full Text> Frontiers of Information Technology & Electronic Engineering 2018 Vol.19 No.10 P.1203-1208 DOI:10.1631/FITEE.1830000 |
| 7 | Generic user revocation systems for attribute-based encryption in cloud storage Author(s):Genlang Chen, Zhiqian Xu, Hai Jiang, Kuan-ching Li Clicked:9039 Download:4452 Cited:0 <Full Text> <PPT> 2802 Frontiers of Information Technology & Electronic Engineering 2018 Vol.19 No.11 P.1362-1384 DOI:10.1631/FITEE.1800405 |
| 8 | Generic attribute revocation systems for attribute-based encryption in cloud storage Author(s):Genlang Chen, Zhiqian Xu, Jia-jian Zhang, Guo-jun Wang, Hai Jiang, Miao-qing Huang Clicked:10111 Download:3941 Cited:0 <Full Text> <PPT> 2601 Frontiers of Information Technology & Electronic Engineering 2019 Vol.20 No.6 P.773-786 DOI:10.1631/FITEE.1800512 |
| 9 | MEACC: an energy-efficient framework for smart devices using cloud computing systems Author(s):Khalid Alsubhi, Zuhaib Imtiaz, Ayesha Raana, M. Usman Ashraf, Babur Hayat Clicked:9051 Download:10008 Cited:0 <Full Text> <PPT> 2705 Frontiers of Information Technology & Electronic Engineering 2020 Vol.21 No.6 P.917-930 DOI:10.1631/FITEE.1900198 |
| 10 | A power resource dispatching framework with a privacy protection function in the Power Internet of Things Author(s):Shuanggen LIU, Shuangzi ZHENG, Wenbo ZHANG, Runsheng FU Clicked:5202 Download:8810 Cited:0 <Full Text> <PPT> 1198 Frontiers of Information Technology & Electronic Engineering 2022 Vol.23 No.9 P.1354-1368 DOI:10.1631/FITEE.2100518 |
| 11 | Public key based bidirectional shadow image authentication without pixel expansion in image secret sharing Author(s):Xuehu YAN, Longlong LI, Jia CHEN, Lei SUN Clicked:4693 Download:16963 Cited:0 <Full Text> <PPT> 1323 Frontiers of Information Technology & Electronic Engineering 2023 Vol.24 No.1 P.88-103 DOI:10.1631/FITEE.2200118 |
| 12 | NEHASH: high-concurrency extendible hashing for non-volatile memory Author(s):Tao CAI, Pengfei GAO, Dejiao NIU, Yueming MA, Tianle LEI, Jianfei DAI Clicked:4274 Download:6341 Cited:0 <Full Text> <PPT> 1081 Frontiers of Information Technology & Electronic Engineering 2023 Vol.24 No.5 P.703-715 DOI:10.1631/FITEE.2200462 |
| 13 | Design and application of new storage systems Author(s):Guangyan ZHANG, Dan FENG, Keqin LI, Zili SHAO, Nong XIAO, Jin XIONG, Weimin ZHENG Clicked:3598 Download:5901 Cited:0 <Full Text> Frontiers of Information Technology & Electronic Engineering 2023 Vol.24 No.5 P.633-636 DOI:10.1631/FITEE.2310000 |
| 14 | MyWAL: performance optimization by removing redundant input/output stack in key-value store Author(s):Xiao ZHANG, Mengyu LI, Michael NGULUBE, Yonghao CHEN, Yiping ZHAO Clicked:4645 Download:4766 Cited:0 <Full Text> <PPT> 1118 Frontiers of Information Technology & Electronic Engineering 2023 Vol.24 No.7 P.980-993 DOI:10.1631/FITEE.2200496 |
| 15 | Efficient privacy-preserving scheme for secure neural network inference Author(s):Liquan CHEN, Zixuan YANG, Peng ZHANG, Yang MA Clicked:2189 Download:4687 Cited:0 <Full Text> <PPT> 529 Frontiers of Information Technology & Electronic Engineering 2025 Vol.26 No.9 P.1609-1623 DOI:10.1631/FITEE.2400371 |
