| index | Title |
| 16 | Transcription: the epicenter of gene expression Author(s):Jiannan Guo Clicked:7252 Download:4387 Cited:0 <Full Text> <PPT> 3256 Journal of Zhejiang University Science B 2014 Vol.15 No.5 P.409-411 DOI:10.1631/jzus.B1400113 |
| 17 | NaEPASC: a novel and efficient public auditing scheme for cloud data Author(s):Shuang Tan, Yan Jia Clicked:12690 Download:9572 Cited:7 <Full Text> <PPT> 3129 Journal of Zhejiang University Science C 2014 Vol.15 No.9 P.794-804 DOI:10.1631/jzus.C1400045 |
| 18 | Cloning of a caffeoyl-coenzyme A O-methyltransferase from Camellia sinensis and analysis of its catalytic activity Author(s):Yue Zhang, Hai-peng Lv, Cheng-ying Ma, Li Guo, Jun-feng Tan, Qun-hua Peng, Zhi Lin Clicked:9052 Download:4802 Cited:1 <Full Text> <PPT> 3123 Journal of Zhejiang University Science B 2015 Vol.16 No.2 P.103-112 DOI:10.1631/jzus.B1400193 |
| 19 | Efficient identity-based signature over NTRU lattice Author(s):Jia Xie, Yu-pu Hu, Jun-tao Gao, Wen Gao Clicked:10117 Download:4715 Cited:4 <Full Text> <PPT> 2550 Frontiers of Information Technology & Electronic Engineering 2016 Vol.17 No.2 P.135-142 DOI:10.1631/FITEE.1500197 |
| 20 | Efficient hierarchical identity based encryption scheme in the standard model over lattices Author(s):Feng-he Wang, Chun-xiao Wang, Zhen-hua Liu Clicked:9589 Download:4705 Cited:0 <Full Text> <PPT> 2587 Frontiers of Information Technology & Electronic Engineering 2016 Vol.17 No.8 P.781-791 DOI:10.1631/FITEE.1500219 |
| 21 | Cryptanalysis of an identity-based public auditing protocol for cloud storage Author(s):Li-bing Wu, Jing Wang, De-biao He, Muhammad-Khurram Khan Clicked:10257 Download:4570 Cited:0 <Full Text> <PPT> 3043 Frontiers of Information Technology & Electronic Engineering 2017 Vol.18 No.12 P.1972-1977 DOI:10.1631/FITEE.1601530 |
| 22 | Constructing pairing-free certificateless public key encryption with keyword search Author(s):Yang Lu, Ji-guo Li Clicked:8461 Download:4391 Cited:0 <Full Text> <PPT> 2319 Frontiers of Information Technology & Electronic Engineering 2019 Vol.20 No.8 P.1049-1060 DOI:10.1631/FITEE.1700534 |
| 23 | Pathogenicity of an FAdV-4 isolate to chickens and its genomic analysis Author(s):Kai-Kun Mo, Chen-Fei Lyu, Shang-Shang Cao, Xia Li, Gang Xing, Yan Yan, Xiao-Juan Zheng, Min Liao, Ji-Yong Zhou Clicked:5934 Download:4309 Cited:0 <Full Text> <PPT> 2440 Journal of Zhejiang University Science B 2019 Vol.20 No.9 P.740-752 DOI:10.1631/jzus.B1900070 |
| 24 | A novel algorithm to counter cross-eye jamming based on a multi-target model Author(s):Zhi-yong Song, Xing-lin Shen, Qiang Fu Clicked:8658 Download:4019 Cited:0 <Full Text> <PPT> 2262 Frontiers of Information Technology & Electronic Engineering 2019 Vol.20 No.7 P.988-1001 DOI:10.1631/FITEE.1800394 |
| 25 | SuPoolVisor: a visual analytics system for mining pool surveillance Author(s):Jia-zhi Xia, Yu-hong Zhang, Hui Ye, Ying Wang, Guang Jiang, Ying Zhao, Cong Xie, Xiao-yan Kui, Sheng-hui Liao, Wei-ping Wang Clicked:9244 Download:4022 Cited:0 <Full Text> <PPT> 2314 Frontiers of Information Technology & Electronic Engineering 2020 Vol.21 No.4 P.507-523 DOI:10.1631/FITEE.1900532 |
| 26 | Novel efficient identity-based signature on lattices Author(s):Jiang-shan Chen, Yu-pu Hu, Hong-mei Liang, Wen Gao Clicked:8729 Download:8302 Cited:0 <Full Text> <PPT> 2139 Frontiers of Information Technology & Electronic Engineering 2021 Vol.22 No.2 P.244-250 DOI:10.1631/FITEE.1900318 |
| 27 | Identity-based threshold proxy re-encryption scheme from lattices and its applications Author(s):Liqiang WU, Yiliang HAN, Xiaoyuan YANG, Minqing ZHANG Clicked:9141 Download:14457 Cited:0 <Full Text> <PPT> 1413 Frontiers of Information Technology & Electronic Engineering 2022 Vol.23 No.2 P.258-277 DOI:10.1631/FITEE.2000366 |
| 28 | High-throughput sequencing identifies salivary microbiota in Chinese caries-free preschool children with primary dentition Author(s):Lei XU, Zhifang WU, Yuan WANG, Sa WANG, Chang SHU, Zhuhui DUAN, Shuli DENG Clicked:6958 Download:4073 Cited:0 <Full Text> <PPT> 2514 Journal of Zhejiang University Science B 2021 Vol.22 No.4 P.285-294 DOI:10.1631/jzus.B2000554 |
| 29 | A partition approach for robust gait recognition based on gait template fusion Author(s):Kejun Wang, Liangliang Liu, Xinnan Ding, Kaiqiang Yu, Gang Hu Clicked:7991 Download:11974 Cited:0 <Full Text> <PPT> 2317 Frontiers of Information Technology & Electronic Engineering 2021 Vol.22 No.5 P.709-719 DOI:10.1631/FITEE.2000377 |
| 30 | Genetic diversity analysis of forty-three insertion/deletion loci for forensic individual identification in Han Chinese from Beijing based on a novel panel Author(s):Congying ZHAO, Jinlong YANG, Hui XU, Shuyan MEI, Yating FANG, Qiong LAN, Yajun DENG, Bofeng ZHU Clicked:4177 Download:4075 Cited:0 <Full Text> <PPT> 1794 Journal of Zhejiang University Science B 2022 Vol.23 No.3 P.241-248 DOI:10.1631/jzus.B2100507 |
