Advanced Search



18 results found in all.
index Title
1Protection of mobile location privacy by using blind signature
Author(s):LIAO Jian, QI Ying-hao, HUANG Pei-wei, RONG Meng-tian, LI Sheng-hong  Clicked:5771  Download:3791  Cited:43  <Full Text>
Journal of Zhejiang University Science A  2006 Vol.7 No.6 P.984-989  DOI:10.1631/jzus.2006.A0984
2A fine-grained access control model for relational databases
Author(s):Jie Shi, Hong Zhu  Clicked:9084  Download:3918  Cited:6  <Full Text>
Journal of Zhejiang University Science C  2010 Vol.11 No.8 P.575-586  DOI:10.1631/jzus.C0910466
3EDA: an enhanced dual-active algorithm for location privacy preservation in mobile P2P networks
Author(s):Yan-zhe Che, Kevin Chiew, Xiao-yan Hong, Qiang Yang, Qin-ming He  Clicked:8378  Download:3621  Cited:0  <Full Text>
Journal of Zhejiang University Science C  2013 Vol.14 No.5 P.356-373  DOI:10.1631/jzus.C1200267
4Preserving privacy information flow security in composite service evolution
Author(s):Huan-feng Peng, Zhi-qiu Huang, Lin-yuan Liu, Yong Li, Da-juan Fan, Yu-qing Wang  Clicked:7013  Download:2370  Cited:0  <Full Text>  <PPT> 1804
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.5 P.626-638  DOI:10.1631/FITEE.1700359
5Generic user revocation systems for attribute-based encryption in cloud storage
Author(s):Genlang Chen, Zhiqian Xu, Hai Jiang, Kuan-ching Li  Clicked:6825  Download:2942  Cited:0  <Full Text>  <PPT> 2274
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.11 P.1362-1384  DOI:10.1631/FITEE.1800405
6Generic attribute revocation systems for attribute-based encryption in cloud storage
Author(s):Genlang Chen, Zhiqian Xu, Jia-jian Zhang, Guo-jun Wang, Hai Jiang, Miao-qing Huang  Clicked:7609  Download:2430  Cited:0  <Full Text>  <PPT> 2199
Frontiers of Information Technology & Electronic Engineering  2019 Vol.20 No.6 P.773-786  DOI:10.1631/FITEE.1800512
7MULKASE: a novel approach for key-aggregate searchable encryption for multi-owner data
Author(s):Mukti Padhya, Devesh C. Jinwala  Clicked:7463  Download:3447  Cited:0  <Full Text>  <PPT> 1888
Frontiers of Information Technology & Electronic Engineering  2019 Vol.20 No.12 P.1717-1748  DOI:10.1631/FITEE.1800192
8Self-deployed execution environment for high performance computing
Author(s):Mingtian SHAO, Kai LU, Wenzhe ZHANG  Clicked:6684  Download:10486  Cited:0  <Full Text>  <PPT> 659
Frontiers of Information Technology & Electronic Engineering  2022 Vol.23 No.6 P.845-857  DOI:10.1631/FITEE.2100016
9A power resource dispatching framework with a privacy protection function in the Power Internet of Things
Author(s):Shuanggen LIU, Shuangzi ZHENG, Wenbo ZHANG, Runsheng FU  Clicked:3629  Download:6478  Cited:0  <Full Text>  <PPT> 766
Frontiers of Information Technology & Electronic Engineering  2022 Vol.23 No.9 P.1354-1368  DOI:10.1631/FITEE.2100518
10A survey of energy-efficient strategies for federated learning in mobile edge computing
Author(s):Kang YAN, Nina SHU, Tao WU, Chunsheng LIU, Panlong YANG  Clicked:2930  Download:1746  Cited:0  <Full Text>  <PPT> 436
Frontiers of Information Technology & Electronic Engineering  2024 Vol.25 No.5 P.645-663  DOI:10.1631/FITEE.2300181
11PPDO: a privacy-preservation-aware delay optimization task-offloading algorithm for collaborative edge computing
Author(s):Chao JING, Jianwu XU  Clicked:1775  Download:1478  Cited:0  <Full Text>  <PPT> 455
Frontiers of Information Technology & Electronic Engineering  2025 Vol.26 No.1 P.27-41  DOI:10.1631/FITEE.2300741
12An efficient online histogram publication method for data streams with local differential privacy
Author(s):Tao TAO, Funan ZHANG, Xiujun WANG, Xiao ZHENG, Xin ZHAO  Clicked:1689  Download:1322  Cited:0  <Full Text>  <PPT> 416
Frontiers of Information Technology & Electronic Engineering  2024 Vol.25 No.8 P.1096-1109  DOI:10.1631/FITEE.2300368
13Reversible data hiding scheme for encrypted JPEG bitstreams using adaptive RZL rotation
Author(s):Yongning GUO, Guodong SU, Zhiqiang YAO, Wang ZHOU  Clicked:1843  Download:1051  Cited:0  <Full Text>  <PPT> 400
Frontiers of Information Technology & Electronic Engineering  2024 Vol.25 No.10 P.1353-1369  DOI:10.1631/FITEE.2300749
14A privacy-preserving vehicle trajectory clustering framework
Author(s):Ran TIAN, Pulun GAO, Yanxing LIU  Clicked:2349  Download:1554  Cited:0  <Full Text>  <PPT> 487
Frontiers of Information Technology & Electronic Engineering  2024 Vol.25 No.7 P.988-1002  DOI:10.1631/FITEE.2300369
15Adaptive layer splitting for wireless large language model inference in edge computing: a model-based reinforcement learning approach
Author(s):Yuxuan CHEN, Rongpeng LI, Xiaoxue YU, Zhifeng ZHAO, Honggang ZHANG  Clicked:1478  Download:1161  Cited:0  <Full Text>  <PPT> 327
Frontiers of Information Technology & Electronic Engineering  2025 Vol.26 No.2 P.278-292  DOI:10.1631/FITEE.2400468
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2025 Journal of Zhejiang University-SCIENCE