| index | Title |
| 1 | An application-layer based centralized information access control for VPN Author(s):Ouyang Kai, Zhou Jing-li, Xia Tao, Yu Sheng-sheng Clicked:8443 Download:3949 Cited:0 <Full Text> Journal of Zhejiang University Science A 2006 Vol.7 No.2 P.240-249 DOI:10.1631/jzus.2006.A0240 |
| 2 | Physical design method of MPSoC Author(s):LIU Peng, XIA Bing-jie, TENG Zhao-wei Clicked:6710 Download:3864 Cited:1 <Full Text> Journal of Zhejiang University Science A 2007 Vol.8 No.4 P.631-637 DOI:10.1631/jzus.2007.A0631 |
| 3 | Towards fully automatic modelling of the fracture process in quasi-brittle and ductile materials: a unified crack growth criterion Author(s):Zhen-jun YANG, Guo-hua LIU Clicked:7457 Download:4757 Cited:3 <Full Text> Journal of Zhejiang University Science A 2008 Vol.9 No.7 P.867-877 DOI:10.1631/jzus.A071540 |
| 4 | k-Dimensional hashing scheme for hard disk integrity verification in computer forensics Author(s):Zoe Lin Jiang, Jun-bin Fang, Lucas Chi Kwong Hui, Siu Ming Yiu, Kam Pui Chow, Meng-meng Sheng Clicked:9392 Download:4427 Cited:0 <Full Text> Journal of Zhejiang University Science C 2011 Vol.12 No.10 P.809-818 DOI:10.1631/jzus.C1000425 |
| 5 | NaEPASC: a novel and efficient public auditing scheme for cloud data Author(s):Shuang Tan, Yan Jia Clicked:12705 Download:9626 Cited:7 <Full Text> <PPT> 3138 Journal of Zhejiang University Science C 2014 Vol.15 No.9 P.794-804 DOI:10.1631/jzus.C1400045 |
| 6 | Botnet detection techniques: review, future trends, and issues Author(s):Ahmad Karim, Rosli Bin Salleh, Muhammad Shiraz, Syed Adeel Ali Shah, Irfan Awan, Nor Badrul Anuar Clicked:23143 Download:27389 Cited:10 <Full Text> <PPT> 3759 Journal of Zhejiang University Science C 2014 Vol.15 No.11 P.943-983 DOI:10.1631/jzus.C1300242 |
| 7 | Hyperechoic demarcation line between a tumor and the muscularis propria layer as a marker for deciding the endoscopic treatment of gastric submucosal tumor Author(s):Yu Zhang, Zhen Wang, Ting Jin, Kai-qiang Li, Ke Hao, Wei Zhang, Bao-ying Fei Clicked:7434 Download:4587 Cited:0 <Full Text> <PPT> 2504 Journal of Zhejiang University Science B 2017 Vol.18 No.8 P.707-716 DOI:10.1631/jzus.B1600256 |
| 8 | Cryptanalysis of an identity-based public auditing protocol for cloud storage Author(s):Li-bing Wu, Jing Wang, De-biao He, Muhammad-Khurram Khan Clicked:10270 Download:4600 Cited:0 <Full Text> <PPT> 3050 Frontiers of Information Technology & Electronic Engineering 2017 Vol.18 No.12 P.1972-1977 DOI:10.1631/FITEE.1601530 |
| 9 | Faster fog-aided private set intersection with integrity preserving Author(s):Qiang Wang, Fu-cai Zhou, Tie-min Ma, Zi-feng Xu Clicked:7046 Download:4520 Cited:0 <Full Text> <PPT> 2354 Frontiers of Information Technology & Electronic Engineering 2018 Vol.19 No.12 P.1558-1568 DOI:10.1631/FITEE.1800518 |
| 10 | A secure data sharing scheme with cheating detection based on Chaum-Pedersen protocol for cloud storage Author(s):Xin Wang, Bo Yang, Zhe Xia, Hong-xia Hou Clicked:10258 Download:4294 Cited:0 <Full Text> <PPT> 2573 Frontiers of Information Technology & Electronic Engineering 2019 Vol.20 No.6 P.787-800 DOI:10.1631/FITEE.1800066 |
| 11 | Identity-based searchable attribute signcryption in lattice for a blockchain-based medical system Author(s):Huifang YU, Xiaoping BAI Clicked:4031 Download:3254 Cited:0 <Full Text> <PPT> 529 Frontiers of Information Technology & Electronic Engineering 2024 Vol.25 No.3 P.461-471 DOI:10.1631/FITEE.2300248 |
| 12 | Sediment transport characteristics and siltation reduction method of high-pile wharves: a physical model and field observation study Author(s):Haojun YANG1,2, Yangyang GAO1,3, Lizhong WANG1,3 Clicked:240 Download:141 Cited:0 <Full Text> Journal of Zhejiang University Science A In Press DOI: |
