| index | Title |
| 1 | ε-inclusion: privacy preserving re-publication of dynamic datasets Author(s):Qiong WEI, Yan-sheng LU, Lei ZOU Clicked:6527 Download:3614 Cited:2 <Full Text> Journal of Zhejiang University Science A 2008 Vol.9 No.8 P.1124-1133 DOI:10.1631/jzus.A071595 |
| 2 | Personal continuous route pattern mining Author(s):Qian YE, Ling CHEN, Gen-cai CHEN Clicked:7368 Download:4266 Cited:2 <Full Text> Journal of Zhejiang University Science A 2009 Vol.10 No.2 P.221-231 DOI:10.1631/jzus.A0820193 |
| 3 | Distributed anonymous data perturbation method for privacy-preserving data mining Author(s):Feng LI, Jin MA, Jian-hua LI Clicked:8005 Download:5798 Cited:3 <Full Text> Journal of Zhejiang University Science A 2009 Vol.10 No.7 P.952-963 DOI:10.1631/jzus.A0820320 |
| 4 | A secure threshold Paillier proxy signature scheme Author(s):Pei-yih TING, Xiao-wei HUANG, Jun-hui WU, Chia-huei HSEU Clicked:10693 Download:4911 Cited:1 <Full Text> Journal of Zhejiang University Science C 2010 Vol.11 No.3 P.206-213 DOI:10.1631/jzus.C0910493 |
| 5 | A fine-grained access control model for relational databases Author(s):Jie Shi, Hong Zhu Clicked:10169 Download:4331 Cited:6 <Full Text> Journal of Zhejiang University Science C 2010 Vol.11 No.8 P.575-586 DOI:10.1631/jzus.C0910466 |
| 6 | Towards a respondent-preferred ki-anonymity model Author(s):Kok-Seng Wong, Myung Ho Kim Clicked:8943 Download:4207 Cited:2 <Full Text> <PPT> 2442 Frontiers of Information Technology & Electronic Engineering 2015 Vol.16 No.9 P.720-731 DOI:10.1631/FITEE.1400395 |
| 7 | TextGen: a realistic text data content generation method for modern storage system benchmarks Author(s):Long-xiang Wang, Xiao-she Dong, Xing-jun Zhang, Yin-feng Wang, Tao Ju, Guo-fu Feng Clicked:11760 Download:5089 Cited:0 <Full Text> <PPT> 2954 Frontiers of Information Technology & Electronic Engineering 2016 Vol.17 No.10 P.982-993 DOI:10.1631/FITEE.1500332 |
| 8 | Cryptanalysis of an identity-based public auditing protocol for cloud storage Author(s):Li-bing Wu, Jing Wang, De-biao He, Muhammad-Khurram Khan Clicked:10270 Download:4600 Cited:0 <Full Text> <PPT> 3050 Frontiers of Information Technology & Electronic Engineering 2017 Vol.18 No.12 P.1972-1977 DOI:10.1631/FITEE.1601530 |
| 9 | Preserving privacy information flow security in composite service evolution Author(s):Huan-feng Peng, Zhi-qiu Huang, Lin-yuan Liu, Yong Li, Da-juan Fan, Yu-qing Wang Clicked:8894 Download:3983 Cited:0 <Full Text> <PPT> 2259 Frontiers of Information Technology & Electronic Engineering 2018 Vol.19 No.5 P.626-638 DOI:10.1631/FITEE.1700359 |
| 10 | Generic user revocation systems for attribute-based encryption in cloud storage Author(s):Genlang Chen, Zhiqian Xu, Hai Jiang, Kuan-ching Li Clicked:9065 Download:4514 Cited:0 <Full Text> <PPT> 2811 Frontiers of Information Technology & Electronic Engineering 2018 Vol.19 No.11 P.1362-1384 DOI:10.1631/FITEE.1800405 |
| 11 | Low powered blockchain consensus protocols based on consistent hash Author(s):Lei Yu, Xiao-fang Zhao, Yan Jin, Heng-yi Cai, Bo Wei, Bin Hu Clicked:8892 Download:4561 Cited:0 <Full Text> <PPT> 2699 Frontiers of Information Technology & Electronic Engineering 2019 Vol.20 No.10 P.1361-1377 DOI:10.1631/FITEE.1800119 |
| 12 | Generic attribute revocation systems for attribute-based encryption in cloud storage Author(s):Genlang Chen, Zhiqian Xu, Jia-jian Zhang, Guo-jun Wang, Hai Jiang, Miao-qing Huang Clicked:10143 Download:3994 Cited:0 <Full Text> <PPT> 2622 Frontiers of Information Technology & Electronic Engineering 2019 Vol.20 No.6 P.773-786 DOI:10.1631/FITEE.1800512 |
| 13 | MULKASE: a novel approach for key-aggregate searchable encryption for multi-owner data Author(s):Mukti Padhya, Devesh C. Jinwala Clicked:9587 Download:5036 Cited:0 <Full Text> <PPT> 2247 Frontiers of Information Technology & Electronic Engineering 2019 Vol.20 No.12 P.1717-1748 DOI:10.1631/FITEE.1800192 |
| 14 | Self-deployed execution environment for high performance computing Author(s):Mingtian SHAO, Kai LU, Wenzhe ZHANG Clicked:8044 Download:13776 Cited:0 <Full Text> <PPT> 1168 Frontiers of Information Technology & Electronic Engineering 2022 Vol.23 No.6 P.845-857 DOI:10.1631/FITEE.2100016 |
| 15 | A power resource dispatching framework with a privacy protection function in the Power Internet of Things Author(s):Shuanggen LIU, Shuangzi ZHENG, Wenbo ZHANG, Runsheng FU Clicked:5238 Download:8877 Cited:0 <Full Text> <PPT> 1213 Frontiers of Information Technology & Electronic Engineering 2022 Vol.23 No.9 P.1354-1368 DOI:10.1631/FITEE.2100518 |
