Advanced Search



17 results found in all.
index Title
1Optimizing storage performance in public cloud platforms
Author(s):Jian-zong Wang, Peter Varman, Chang-sheng Xie  Clicked:11395  Download:5389  Cited:6  <Full Text>
Journal of Zhejiang University Science C  2011 Vol.12 No.12 P.951-964  DOI:10.1631/jzus.C1100097
2Efficient revocation in ciphertext-policy attribute-based encryption based cryptographic cloud storage
Author(s):Yong Cheng, Zhi-ying Wang, Jun Ma, Jiang-jiang Wu, Song-zhu Mei, Jiang-chun Ren  Clicked:12577  Download:9588  Cited:14  <Full Text>
Journal of Zhejiang University Science C  2013 Vol.14 No.2 P.85-97  DOI:10.1631/jzus.C1200240
3NaEPASC: a novel and efficient public auditing scheme for cloud data
Author(s):Shuang Tan, Yan Jia  Clicked:12398  Download:8721  Cited:7  <Full Text>  <PPT> 3031
Journal of Zhejiang University Science C  2014 Vol.15 No.9 P.794-804  DOI:10.1631/jzus.C1400045
4Analyzing the service availability of mobile cloud computing systems by fluid-flow approximation
Author(s):Hong-wu Lv, Jun-yu Lin, Hui-qiang Wang, Guang-sheng Feng, Mo Zhou  Clicked:9975  Download:3857  Cited:2  <Full Text>  <PPT> 2860
Frontiers of Information Technology & Electronic Engineering  2015 Vol.16 No.7 P.553-567  DOI:10.1631/FITEE.1400410
5Cryptanalysis of an identity-based public auditing protocol for cloud storage
Author(s):Li-bing Wu, Jing Wang, De-biao He, Muhammad-Khurram Khan  Clicked:9923  Download:3999  Cited:0  <Full Text>  <PPT> 2940
Frontiers of Information Technology & Electronic Engineering  2017 Vol.18 No.12 P.1972-1977  DOI:10.1631/FITEE.1601530
6Post-exascale supercomputing: research opportunities abound
Author(s):Zuo-ning Chen, Jack Dongarra, Zhi-wei Xu  Clicked:6981  Download:3937  Cited:0  <Full Text>
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.10 P.1203-1208  DOI:10.1631/FITEE.1830000
7Generic user revocation systems for attribute-based encryption in cloud storage
Author(s):Genlang Chen, Zhiqian Xu, Hai Jiang, Kuan-ching Li  Clicked:8677  Download:3873  Cited:0  <Full Text>  <PPT> 2694
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.11 P.1362-1384  DOI:10.1631/FITEE.1800405
8A secure data sharing scheme with cheating detection based on Chaum-Pedersen protocol for cloud storage
Author(s):Xin Wang, Bo Yang, Zhe Xia, Hong-xia Hou  Clicked:9905  Download:3656  Cited:0  <Full Text>  <PPT> 2446
Frontiers of Information Technology & Electronic Engineering  2019 Vol.20 No.6 P.787-800  DOI:10.1631/FITEE.1800066
9Generic attribute revocation systems for attribute-based encryption in cloud storage
Author(s):Genlang Chen, Zhiqian Xu, Jia-jian Zhang, Guo-jun Wang, Hai Jiang, Miao-qing Huang  Clicked:9733  Download:3409  Cited:0  <Full Text>  <PPT> 2506
Frontiers of Information Technology & Electronic Engineering  2019 Vol.20 No.6 P.773-786  DOI:10.1631/FITEE.1800512
10MULKASE: a novel approach for key-aggregate searchable encryption for multi-owner data
Author(s):Mukti Padhya, Devesh C. Jinwala  Clicked:9214  Download:4396  Cited:0  <Full Text>  <PPT> 2169
Frontiers of Information Technology & Electronic Engineering  2019 Vol.20 No.12 P.1717-1748  DOI:10.1631/FITEE.1800192
11MEACC: an energy-efficient framework for smart devices using cloud computing systems
Author(s):Khalid Alsubhi, Zuhaib Imtiaz, Ayesha Raana, M. Usman Ashraf, Babur Hayat  Clicked:8801  Download:9286  Cited:0  <Full Text>  <PPT> 2624
Frontiers of Information Technology & Electronic Engineering  2020 Vol.21 No.6 P.917-930  DOI:10.1631/FITEE.1900198
12A power resource dispatching framework with a privacy protection function in the Power Internet of Things
Author(s):Shuanggen LIU, Shuangzi ZHENG, Wenbo ZHANG, Runsheng FU  Clicked:4910  Download:8136  Cited:0  <Full Text>  <PPT> 1125
Frontiers of Information Technology & Electronic Engineering  2022 Vol.23 No.9 P.1354-1368  DOI:10.1631/FITEE.2100518
13Public key based bidirectional shadow image authentication without pixel expansion in image secret sharing
Author(s):Xuehu YAN, Longlong LI, Jia CHEN, Lei SUN  Clicked:4273  Download:16026  Cited:0  <Full Text>  <PPT> 1210
Frontiers of Information Technology & Electronic Engineering  2023 Vol.24 No.1 P.88-103  DOI:10.1631/FITEE.2200118
14NEHASH: high-concurrency extendible hashing for non-volatile memory
Author(s):Tao CAI, Pengfei GAO, Dejiao NIU, Yueming MA, Tianle LEI, Jianfei DAI  Clicked:3901  Download:5441  Cited:0  <Full Text>  <PPT> 980
Frontiers of Information Technology & Electronic Engineering  2023 Vol.24 No.5 P.703-715  DOI:10.1631/FITEE.2200462
15Design and application of new storage systems
Author(s):Guangyan ZHANG, Dan FENG, Keqin LI, Zili SHAO, Nong XIAO, Jin XIONG, Weimin ZHENG  Clicked:3312  Download:5187  Cited:0  <Full Text>
Frontiers of Information Technology & Electronic Engineering  2023 Vol.24 No.5 P.633-636  DOI:10.1631/FITEE.2310000
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2026 Journal of Zhejiang University-SCIENCE