Advanced Search



11 results found in all.
index Title
1An application-layer based centralized information access control for VPN
Author(s):Ouyang Kai, Zhou Jing-li, Xia Tao, Yu Sheng-sheng  Clicked:7584  Download:3494  Cited:0  <Full Text>
Journal of Zhejiang University Science A  2006 Vol.7 No.2 P.240-249  DOI:10.1631/jzus.2006.A0240
2Physical design method of MPSoC
Author(s):LIU Peng, XIA Bing-jie, TENG Zhao-wei  Clicked:6009  Download:3552  Cited:1  <Full Text>
Journal of Zhejiang University Science A  2007 Vol.8 No.4 P.631-637  DOI:10.1631/jzus.2007.A0631
3Towards fully automatic modelling of the fracture process in quasi-brittle and ductile materials: a unified crack growth criterion
Author(s):Zhen-jun YANG, Guo-hua LIU  Clicked:6763  Download:4321  Cited:3  <Full Text>
Journal of Zhejiang University Science A  2008 Vol.9 No.7 P.867-877  DOI:10.1631/jzus.A071540
4k-Dimensional hashing scheme for hard disk integrity verification in computer forensics
Author(s):Zoe Lin Jiang, Jun-bin Fang, Lucas Chi Kwong Hui, Siu Ming Yiu, Kam Pui Chow, Meng-meng Sheng  Clicked:8857  Download:4160  Cited:0  <Full Text>
Journal of Zhejiang University Science C  2011 Vol.12 No.10 P.809-818  DOI:10.1631/jzus.C1000425
5NaEPASC: a novel and efficient public auditing scheme for cloud data
Author(s):Shuang Tan, Yan Jia  Clicked:11842  Download:7748  Cited:7  <Full Text>  <PPT> 2764
Journal of Zhejiang University Science C  2014 Vol.15 No.9 P.794-804  DOI:10.1631/jzus.C1400045
6Botnet detection techniques: review, future trends, and issues
Author(s):Ahmad Karim, Rosli Bin Salleh, Muhammad Shiraz, Syed Adeel Ali Shah, Irfan Awan, Nor Badrul Anuar  Clicked:22002  Download:23683  Cited:10  <Full Text>  <PPT> 3345
Journal of Zhejiang University Science C  2014 Vol.15 No.11 P.943-983  DOI:10.1631/jzus.C1300242
7Hyperechoic demarcation line between a tumor and the muscularis propria layer as a marker for deciding the endoscopic treatment of gastric submucosal tumor
Author(s):Yu Zhang, Zhen Wang, Ting Jin, Kai-qiang Li, Ke Hao, Wei Zhang, Bao-ying Fei  Clicked:6552  Download:3405  Cited:0  <Full Text>  <PPT> 2159
Journal of Zhejiang University Science B  2017 Vol.18 No.8 P.707-716  DOI:10.1631/jzus.B1600256
8Cryptanalysis of an identity-based public auditing protocol for cloud storage
Author(s):Li-bing Wu, Jing Wang, De-biao He, Muhammad-Khurram Khan  Clicked:9410  Download:3416  Cited:0  <Full Text>  <PPT> 2741
Frontiers of Information Technology & Electronic Engineering  2017 Vol.18 No.12 P.1972-1977  DOI:10.1631/FITEE.1601530
9Faster fog-aided private set intersection with integrity preserving
Author(s):Qiang Wang, Fu-cai Zhou, Tie-min Ma, Zi-feng Xu  Clicked:6312  Download:3318  Cited:0  <Full Text>  <PPT> 2083
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.12 P.1558-1568  DOI:10.1631/FITEE.1800518
10A secure data sharing scheme with cheating detection based on Chaum-Pedersen protocol for cloud storage
Author(s):Xin Wang, Bo Yang, Zhe Xia, Hong-xia Hou  Clicked:9287  Download:3007  Cited:0  <Full Text>  <PPT> 2238
Frontiers of Information Technology & Electronic Engineering  2019 Vol.20 No.6 P.787-800  DOI:10.1631/FITEE.1800066
11Identity-based searchable attribute signcryption in lattice for a blockchain-based medical system
Author(s):Huifang YU, Xiaoping BAI  Clicked:2993  Download:1850  Cited:0  <Full Text>  <PPT> 157
Frontiers of Information Technology & Electronic Engineering  2024 Vol.25 No.3 P.461-471  DOI:10.1631/FITEE.2300248
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2025 Journal of Zhejiang University-SCIENCE