Advanced Search



38 results found in all.
index Title
16Discrimination between Demodex folliculorum (Acari: Demodicidae) isolates from China and Spain based on mitochondrial cox1 sequences
Author(s):Ya-e Zhao, Jun-xian Ma, Li Hu, Li-ping Wu, Manuel De Rojas  Clicked:6278  Download:3494  Cited:8  <Full Text>
Journal of Zhejiang University Science B  2013 Vol.14 No.9 P.829-836  DOI:10.1631/jzus.B1200363
17Transcription: the epicenter of gene expression
Author(s):Jiannan Guo  Clicked:5940  Download:2883  Cited:0  <Full Text>  <PPT> 2386
Journal of Zhejiang University Science B  2014 Vol.15 No.5 P.409-411  DOI:10.1631/jzus.B1400113
18NaEPASC: a novel and efficient public auditing scheme for cloud data
Author(s):Shuang Tan, Yan Jia  Clicked:11420  Download:7094  Cited:7  <Full Text>  <PPT> 2576
Journal of Zhejiang University Science C  2014 Vol.15 No.9 P.794-804  DOI:10.1631/jzus.C1400045
19Cloning of a caffeoyl-coenzyme A O-methyltransferase from Camellia sinensis and analysis of its catalytic activity
Author(s):Yue Zhang, Hai-peng Lv, Cheng-ying Ma, Li Guo, Jun-feng Tan, Qun-hua Peng, Zhi Lin  Clicked:6807  Download:3289  Cited:1  <Full Text>  <PPT> 2513
Journal of Zhejiang University Science B  2015 Vol.16 No.2 P.103-112  DOI:10.1631/jzus.B1400193
20Efficient identity-based signature over NTRU lattice
Author(s):Jia Xie, Yu-pu Hu, Jun-tao Gao, Wen Gao  Clicked:8544  Download:3192  Cited:4  <Full Text>  <PPT> 2249
Frontiers of Information Technology & Electronic Engineering  2016 Vol.17 No.2 P.135-142  DOI:10.1631/FITEE.1500197
21Efficient hierarchical identity based encryption scheme in the standard model over lattices
Author(s):Feng-he Wang, Chun-xiao Wang, Zhen-hua Liu  Clicked:7423  Download:3083  Cited:0  <Full Text>  <PPT> 2123
Frontiers of Information Technology & Electronic Engineering  2016 Vol.17 No.8 P.781-791  DOI:10.1631/FITEE.1500219
22Cryptanalysis of an identity-based public auditing protocol for cloud storage
Author(s):Li-bing Wu, Jing Wang, De-biao He, Muhammad-Khurram Khan  Clicked:9090  Download:3138  Cited:0  <Full Text>  <PPT> 2537
Frontiers of Information Technology & Electronic Engineering  2017 Vol.18 No.12 P.1972-1977  DOI:10.1631/FITEE.1601530
23Constructing pairing-free certificateless public key encryption with keyword search
Author(s):Yang Lu, Ji-guo Li  Clicked:6859  Download:2879  Cited:0  <Full Text>  <PPT> 1820
Frontiers of Information Technology & Electronic Engineering  2019 Vol.20 No.8 P.1049-1060  DOI:10.1631/FITEE.1700534
24Pathogenicity of an FAdV-4 isolate to chickens and its genomic analysis
Author(s):Kai-Kun Mo, Chen-Fei Lyu, Shang-Shang Cao, Xia Li, Gang Xing, Yan Yan, Xiao-Juan Zheng, Min Liao, Ji-Yong Zhou  Clicked:4216  Download:2807  Cited:0  <Full Text>  <PPT> 1795
Journal of Zhejiang University Science B  2019 Vol.20 No.9 P.740-752  DOI:10.1631/jzus.B1900070
25A novel algorithm to counter cross-eye jamming based on a multi-target model
Author(s):Zhi-yong Song, Xing-lin Shen, Qiang Fu  Clicked:7444  Download:2594  Cited:0  <Full Text>  <PPT> 1874
Frontiers of Information Technology & Electronic Engineering  2019 Vol.20 No.7 P.988-1001  DOI:10.1631/FITEE.1800394
26SuPoolVisor: a visual analytics system for mining pool surveillance
Author(s):Jia-zhi Xia, Yu-hong Zhang, Hui Ye, Ying Wang, Guang Jiang, Ying Zhao, Cong Xie, Xiao-yan Kui, Sheng-hui Liao, Wei-ping Wang  Clicked:7292  Download:2616  Cited:0  <Full Text>  <PPT> 1843
Frontiers of Information Technology & Electronic Engineering  2020 Vol.21 No.4 P.507-523  DOI:10.1631/FITEE.1900532
27Novel efficient identity-based signature on lattices
Author(s):Jiang-shan Chen, Yu-pu Hu, Hong-mei Liang, Wen Gao  Clicked:7081  Download:6270  Cited:0  <Full Text>  <PPT> 1791
Frontiers of Information Technology & Electronic Engineering  2021 Vol.22 No.2 P.244-250  DOI:10.1631/FITEE.1900318
28Identity-based threshold proxy re-encryption scheme from lattices and its applications
Author(s):Liqiang WU, Yiliang HAN, Xiaoyuan YANG, Minqing ZHANG  Clicked:7730  Download:11711  Cited:0  <Full Text>  <PPT> 991
Frontiers of Information Technology & Electronic Engineering  2022 Vol.23 No.2 P.258-277  DOI:10.1631/FITEE.2000366
29High-throughput sequencing identifies salivary microbiota in Chinese caries-free preschool children with primary dentition
Author(s):Lei XU, Zhifang WU, Yuan WANG, Sa WANG, Chang SHU, Zhuhui DUAN, Shuli DENG  Clicked:4884  Download:2558  Cited:0  <Full Text>  <PPT> 1881
Journal of Zhejiang University Science B  2021 Vol.22 No.4 P.285-294  DOI:10.1631/jzus.B2000554
30A partition approach for robust gait recognition based on gait template fusion
Author(s):Kejun Wang, Liangliang Liu, Xinnan Ding, Kaiqiang Yu, Gang Hu  Clicked:6287  Download:9376  Cited:0  <Full Text>  <PPT> 1730
Frontiers of Information Technology & Electronic Engineering  2021 Vol.22 No.5 P.709-719  DOI:10.1631/FITEE.2000377
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2025 Journal of Zhejiang University-SCIENCE