Advanced Search



17 results found in all.
index Title
1Optimizing storage performance in public cloud platforms
Author(s):Jian-zong Wang, Peter Varman, Chang-sheng Xie  Clicked:10701  Download:5043  Cited:6  <Full Text>
Journal of Zhejiang University Science C  2011 Vol.12 No.12 P.951-964  DOI:10.1631/jzus.C1100097
2Efficient revocation in ciphertext-policy attribute-based encryption based cryptographic cloud storage
Author(s):Yong Cheng, Zhi-ying Wang, Jun Ma, Jiang-jiang Wu, Song-zhu Mei, Jiang-chun Ren  Clicked:11485  Download:8759  Cited:14  <Full Text>
Journal of Zhejiang University Science C  2013 Vol.14 No.2 P.85-97  DOI:10.1631/jzus.C1200240
3NaEPASC: a novel and efficient public auditing scheme for cloud data
Author(s):Shuang Tan, Yan Jia  Clicked:11414  Download:7075  Cited:7  <Full Text>  <PPT> 2574
Journal of Zhejiang University Science C  2014 Vol.15 No.9 P.794-804  DOI:10.1631/jzus.C1400045
4Analyzing the service availability of mobile cloud computing systems by fluid-flow approximation
Author(s):Hong-wu Lv, Jun-yu Lin, Hui-qiang Wang, Guang-sheng Feng, Mo Zhou  Clicked:8616  Download:3023  Cited:2  <Full Text>  <PPT> 2423
Frontiers of Information Technology & Electronic Engineering  2015 Vol.16 No.7 P.553-567  DOI:10.1631/FITEE.1400410
5Cryptanalysis of an identity-based public auditing protocol for cloud storage
Author(s):Li-bing Wu, Jing Wang, De-biao He, Muhammad-Khurram Khan  Clicked:9079  Download:3137  Cited:0  <Full Text>  <PPT> 2534
Frontiers of Information Technology & Electronic Engineering  2017 Vol.18 No.12 P.1972-1977  DOI:10.1631/FITEE.1601530
6Post-exascale supercomputing: research opportunities abound
Author(s):Zuo-ning Chen, Jack Dongarra, Zhi-wei Xu  Clicked:5681  Download:3006  Cited:0  <Full Text>
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.10 P.1203-1208  DOI:10.1631/FITEE.1830000
7Generic user revocation systems for attribute-based encryption in cloud storage
Author(s):Genlang Chen, Zhiqian Xu, Hai Jiang, Kuan-ching Li  Clicked:6866  Download:2945  Cited:0  <Full Text>  <PPT> 2274
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.11 P.1362-1384  DOI:10.1631/FITEE.1800405
8A secure data sharing scheme with cheating detection based on Chaum-Pedersen protocol for cloud storage
Author(s):Xin Wang, Bo Yang, Zhe Xia, Hong-xia Hou  Clicked:8837  Download:2687  Cited:0  <Full Text>  <PPT> 2084
Frontiers of Information Technology & Electronic Engineering  2019 Vol.20 No.6 P.787-800  DOI:10.1631/FITEE.1800066
9Generic attribute revocation systems for attribute-based encryption in cloud storage
Author(s):Genlang Chen, Zhiqian Xu, Jia-jian Zhang, Guo-jun Wang, Hai Jiang, Miao-qing Huang  Clicked:7649  Download:2433  Cited:0  <Full Text>  <PPT> 2200
Frontiers of Information Technology & Electronic Engineering  2019 Vol.20 No.6 P.773-786  DOI:10.1631/FITEE.1800512
10MULKASE: a novel approach for key-aggregate searchable encryption for multi-owner data
Author(s):Mukti Padhya, Devesh C. Jinwala  Clicked:7483  Download:3450  Cited:0  <Full Text>  <PPT> 1889
Frontiers of Information Technology & Electronic Engineering  2019 Vol.20 No.12 P.1717-1748  DOI:10.1631/FITEE.1800192
11MEACC: an energy-efficient framework for smart devices using cloud computing systems
Author(s):Khalid Alsubhi, Zuhaib Imtiaz, Ayesha Raana, M. Usman Ashraf, Babur Hayat  Clicked:7560  Download:7461  Cited:0  <Full Text>  <PPT> 2190
Frontiers of Information Technology & Electronic Engineering  2020 Vol.21 No.6 P.917-930  DOI:10.1631/FITEE.1900198
12A power resource dispatching framework with a privacy protection function in the Power Internet of Things
Author(s):Shuanggen LIU, Shuangzi ZHENG, Wenbo ZHANG, Runsheng FU  Clicked:3642  Download:6522  Cited:0  <Full Text>  <PPT> 768
Frontiers of Information Technology & Electronic Engineering  2022 Vol.23 No.9 P.1354-1368  DOI:10.1631/FITEE.2100518
13Public key based bidirectional shadow image authentication without pixel expansion in image secret sharing
Author(s):Xuehu YAN, Longlong LI, Jia CHEN, Lei SUN  Clicked:3240  Download:13683  Cited:0  <Full Text>  <PPT> 885
Frontiers of Information Technology & Electronic Engineering  2023 Vol.24 No.1 P.88-103  DOI:10.1631/FITEE.2200118
14NEHASH: high-concurrency extendible hashing for non-volatile memory
Author(s):Tao CAI, Pengfei GAO, Dejiao NIU, Yueming MA, Tianle LEI, Jianfei DAI  Clicked:2940  Download:3396  Cited:0  <Full Text>  <PPT> 640
Frontiers of Information Technology & Electronic Engineering  2023 Vol.24 No.5 P.703-715  DOI:10.1631/FITEE.2200462
15Design and application of new storage systems
Author(s):Guangyan ZHANG, Dan FENG, Keqin LI, Zili SHAO, Nong XIAO, Jin XIONG, Weimin ZHENG  Clicked:2421  Download:3879  Cited:0  <Full Text>
Frontiers of Information Technology & Electronic Engineering  2023 Vol.24 No.5 P.633-636  DOI:10.1631/FITEE.2310000
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2025 Journal of Zhejiang University-SCIENCE