Advanced Search



34 results found in all.
index Title
1ε-inclusion: privacy preserving re-publication of dynamic datasets
Author(s):Qiong WEI, Yan-sheng LU, Lei ZOU  Clicked:6039  Download:3313  Cited:2  <Full Text>
Journal of Zhejiang University Science A  2008 Vol.9 No.8 P.1124-1133  DOI:10.1631/jzus.A071595
2Personal continuous route pattern mining
Author(s):Qian YE, Ling CHEN, Gen-cai CHEN  Clicked:6616  Download:3826  Cited:2  <Full Text>
Journal of Zhejiang University Science A  2009 Vol.10 No.2 P.221-231  DOI:10.1631/jzus.A0820193
3Distributed anonymous data perturbation method for privacy-preserving data mining
Author(s):Feng LI, Jin MA, Jian-hua LI  Clicked:7249  Download:5465  Cited:3  <Full Text>
Journal of Zhejiang University Science A  2009 Vol.10 No.7 P.952-963  DOI:10.1631/jzus.A0820320
4A secure threshold Paillier proxy signature scheme
Author(s):Pei-yih TING, Xiao-wei HUANG, Jun-hui WU, Chia-huei HSEU  Clicked:9949  Download:4424  Cited:1  <Full Text>
Journal of Zhejiang University Science C  2010 Vol.11 No.3 P.206-213  DOI:10.1631/jzus.C0910493
5A fine-grained access control model for relational databases
Author(s):Jie Shi, Hong Zhu  Clicked:9398  Download:4017  Cited:6  <Full Text>
Journal of Zhejiang University Science C  2010 Vol.11 No.8 P.575-586  DOI:10.1631/jzus.C0910466
6Towards a respondent-preferred ki-anonymity model
Author(s):Kok-Seng Wong, Myung Ho Kim  Clicked:8152  Download:3025  Cited:2  <Full Text>  <PPT> 2230
Frontiers of Information Technology & Electronic Engineering  2015 Vol.16 No.9 P.720-731  DOI:10.1631/FITEE.1400395
7TextGen: a realistic text data content generation method for modern storage system benchmarks
Author(s):Long-xiang Wang, Xiao-she Dong, Xing-jun Zhang, Yin-feng Wang, Tao Ju, Guo-fu Feng  Clicked:10869  Download:3705  Cited:0  <Full Text>  <PPT> 2577
Frontiers of Information Technology & Electronic Engineering  2016 Vol.17 No.10 P.982-993  DOI:10.1631/FITEE.1500332
8Cryptanalysis of an identity-based public auditing protocol for cloud storage
Author(s):Li-bing Wu, Jing Wang, De-biao He, Muhammad-Khurram Khan  Clicked:9410  Download:3416  Cited:0  <Full Text>  <PPT> 2741
Frontiers of Information Technology & Electronic Engineering  2017 Vol.18 No.12 P.1972-1977  DOI:10.1631/FITEE.1601530
9Preserving privacy information flow security in composite service evolution
Author(s):Huan-feng Peng, Zhi-qiu Huang, Lin-yuan Liu, Yong Li, Da-juan Fan, Yu-qing Wang  Clicked:7974  Download:2657  Cited:0  <Full Text>  <PPT> 1975
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.5 P.626-638  DOI:10.1631/FITEE.1700359
10Generic user revocation systems for attribute-based encryption in cloud storage
Author(s):Genlang Chen, Zhiqian Xu, Hai Jiang, Kuan-ching Li  Clicked:8114  Download:3225  Cited:0  <Full Text>  <PPT> 2427
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.11 P.1362-1384  DOI:10.1631/FITEE.1800405
11Low powered blockchain consensus protocols based on consistent hash
Author(s):Lei Yu, Xiao-fang Zhao, Yan Jin, Heng-yi Cai, Bo Wei, Bin Hu  Clicked:7988  Download:3318  Cited:0  <Full Text>  <PPT> 2398
Frontiers of Information Technology & Electronic Engineering  2019 Vol.20 No.10 P.1361-1377  DOI:10.1631/FITEE.1800119
12Generic attribute revocation systems for attribute-based encryption in cloud storage
Author(s):Genlang Chen, Zhiqian Xu, Jia-jian Zhang, Guo-jun Wang, Hai Jiang, Miao-qing Huang  Clicked:9063  Download:2742  Cited:0  <Full Text>  <PPT> 2331
Frontiers of Information Technology & Electronic Engineering  2019 Vol.20 No.6 P.773-786  DOI:10.1631/FITEE.1800512
13MULKASE: a novel approach for key-aggregate searchable encryption for multi-owner data
Author(s):Mukti Padhya, Devesh C. Jinwala  Clicked:8680  Download:3796  Cited:0  <Full Text>  <PPT> 2012
Frontiers of Information Technology & Electronic Engineering  2019 Vol.20 No.12 P.1717-1748  DOI:10.1631/FITEE.1800192
14Self-deployed execution environment for high performance computing
Author(s):Mingtian SHAO, Kai LU, Wenzhe ZHANG  Clicked:7044  Download:11429  Cited:0  <Full Text>  <PPT> 779
Frontiers of Information Technology & Electronic Engineering  2022 Vol.23 No.6 P.845-857  DOI:10.1631/FITEE.2100016
15A power resource dispatching framework with a privacy protection function in the Power Internet of Things
Author(s):Shuanggen LIU, Shuangzi ZHENG, Wenbo ZHANG, Runsheng FU  Clicked:4380  Download:7119  Cited:0  <Full Text>  <PPT> 943
Frontiers of Information Technology & Electronic Engineering  2022 Vol.23 No.9 P.1354-1368  DOI:10.1631/FITEE.2100518
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2025 Journal of Zhejiang University-SCIENCE