Advanced Search



13 results found in all.
index Title
1Applying two channels to vector space secret sharing based multi-signature scheme
Author(s):XIAO Qing-hua, PING Ling-di, CHEN Xiao-ping, PAN Xue-zeng  Clicked:7446  Download:3620  Cited:0  <Full Text>
Journal of Zhejiang University Science A  2005 Vol.6 No.1 P.56-62  DOI:10.1631/jzus.2005.A0056
2A secure threshold Paillier proxy signature scheme
Author(s):Pei-yih TING, Xiao-wei HUANG, Jun-hui WU, Chia-huei HSEU  Clicked:9484  Download:4332  Cited:1  <Full Text>
Journal of Zhejiang University Science C  2010 Vol.11 No.3 P.206-213  DOI:10.1631/jzus.C0910493
3Estimation of financial loss ratio for E-insurance: a quantitative model
Author(s):ZHONG Yuan-sheng, CHEN De-ren, SHI Min-hua  Clicked:4601  Download:2858  Cited:0  <Full Text>
Journal of Zhejiang University Science  2002 Vol.3 No.2 P.140-147  DOI:10.1631/jzus.2002.0140
4An incentive model for voting based on information-hiding in P2P networks
Author(s):Bo-wei Yang, Guang-hua Song, Yao Zheng  Clicked:9083  Download:3320  Cited:2  <Full Text>
Journal of Zhejiang University Science C  2010 Vol.11 No.12 P.967-975  DOI:10.1631/jzus.C0910727
5Efficient and secure three-party authenticated key exchange protocol for mobile environments
Author(s):Chih-ho Chou, Kuo-yu Tsai, Tzong-chen Wu, Kuo-hui Yeh  Clicked:7516  Download:3563  Cited:1  <Full Text>
Journal of Zhejiang University Science C  2013 Vol.14 No.5 P.347-355  DOI:10.1631/jzus.C1200273
6E-commerce business model mining and prediction
Author(s):Zhou-zhou He, Zhong-fei Zhang, Chun-ming Chen, Zheng-gang Wang  Clicked:11960  Download:3496  Cited:1  <Full Text>  <PPT> 2461
Frontiers of Information Technology & Electronic Engineering  2015 Vol.16 No.9 P.707-719  DOI:10.1631/FITEE.1500148
7A lightweight authentication scheme with user untraceability
Author(s):Kuo-Hui Yeh  Clicked:8635  Download:3473  Cited:2  <Full Text>  <PPT> 2554
Frontiers of Information Technology & Electronic Engineering  2015 Vol.16 No.4 P.259-271  DOI:10.1631/FITEE.1400232
8Special issue on artificial intelligence 2.0
Author(s):Yun-he Pan  Clicked:8924  Download:4406  Cited:1  <Full Text>
Frontiers of Information Technology & Electronic Engineering  2017 Vol.18 No.1 P.1-2  DOI:10.1631/FITEE.1710000
9A novel confidence estimation method for heterogeneous implicit feedback
Author(s):Jing Wang, Lan-fen Lin, Heng Zhang, Jia-qi Tu, Peng-hua Yu  Clicked:8065  Download:2753  Cited:0  <Full Text>  <PPT> 2524
Frontiers of Information Technology & Electronic Engineering  2017 Vol.18 No.11 P.1817-1827  DOI:10.1631/FITEE.1601468
10SmartPaint: a co-creative drawing system based on generative adversarial networks
Author(s):Lingyun Sun, Pei Chen, Wei Xiang, Peng Chen, Wei-yue Gao, Ke-jun Zhang  Clicked:8555  Download:2978  Cited:0  <Full Text>  <PPT> 2158
Frontiers of Information Technology & Electronic Engineering  2019 Vol.20 No.12 P.1644-1656  DOI:10.1631/FITEE.1900386
11Post-quantum blind signcryption scheme from lattice
Author(s):Huifang Yu, Lu Bai  Clicked:5940  Download:8567  Cited:0  <Full Text>  <PPT> 1876
Frontiers of Information Technology & Electronic Engineering  2021 Vol.22 No.6 P.891-901  DOI:10.1631/FITEE.2000099
12MyWAL: performance optimization by removing redundant input/output stack in key-value store
Author(s):Xiao ZHANG, Mengyu LI, Michael NGULUBE, Yonghao CHEN, Yiping ZHAO  Clicked:2636  Download:2564  Cited:0  <Full Text>  <PPT> 633
Frontiers of Information Technology & Electronic Engineering  2023 Vol.24 No.7 P.980-993  DOI:10.1631/FITEE.2200496
13Detecting compromised accounts caused by phone number recycling on e-commerce platforms: taking Meituan as an example
Author(s):Min GAO, Shutong CHEN, Yangbo GAO, Zhenhua ZHANG, Yu CHEN, Yupeng LI, Qiongzan YE, Xin WANG, Yang CHEN  Clicked:2094  Download:2045  Cited:0  <Full Text>  <PPT> 406
Frontiers of Information Technology & Electronic Engineering  2024 Vol.25 No.8 P.1077-1095  DOI:10.1631/FITEE.2300291
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2025 Journal of Zhejiang University-SCIENCE