| index | Title |
| 1 | Non-interactive identity-based threshold signature scheme without random oracles Author(s):Xun SUN, Jian-hua LI, Shu-tang YANG, Gong-liang CHEN Clicked:7183 Download:4006 Cited:4 <Full Text> Journal of Zhejiang University Science A 2008 Vol.9 No.6 P.727-736 DOI:10.1631/jzus.A0720028 |
| 2 | CCA2 secure biometric identity based encryption with constant-size ciphertext Author(s):Yang Yang, Yu-pu Hu, Le-you Zhang, Chun-hui Sun Clicked:10211 Download:4330 Cited:1 <Full Text> Journal of Zhejiang University Science C 2011 Vol.12 No.10 P.819-827 DOI:10.1631/jzus.C1000429 |
| 3 | NaEPASC: a novel and efficient public auditing scheme for cloud data Author(s):Shuang Tan, Yan Jia Clicked:12415 Download:8748 Cited:7 <Full Text> <PPT> 3034 Journal of Zhejiang University Science C 2014 Vol.15 No.9 P.794-804 DOI:10.1631/jzus.C1400045 |
| 4 | Efficient identity-based signature over NTRU lattice Author(s):Jia Xie, Yu-pu Hu, Jun-tao Gao, Wen Gao Clicked:9821 Download:4147 Cited:4 <Full Text> <PPT> 2496 Frontiers of Information Technology & Electronic Engineering 2016 Vol.17 No.2 P.135-142 DOI:10.1631/FITEE.1500197 |
| 5 | Efficient hierarchical identity based encryption scheme in the standard model over lattices Author(s):Feng-he Wang, Chun-xiao Wang, Zhen-hua Liu Clicked:9252 Download:4095 Cited:0 <Full Text> <PPT> 2491 Frontiers of Information Technology & Electronic Engineering 2016 Vol.17 No.8 P.781-791 DOI:10.1631/FITEE.1500219 |
| 6 | A novel algorithm to counter cross-eye jamming based on a multi-target model Author(s):Zhi-yong Song, Xing-lin Shen, Qiang Fu Clicked:8323 Download:3456 Cited:0 <Full Text> <PPT> 2194 Frontiers of Information Technology & Electronic Engineering 2019 Vol.20 No.7 P.988-1001 DOI:10.1631/FITEE.1800394 |
| 7 | Novel efficient identity-based signature on lattices Author(s):Jiang-shan Chen, Yu-pu Hu, Hong-mei Liang, Wen Gao Clicked:8419 Download:7570 Cited:0 <Full Text> <PPT> 2069 Frontiers of Information Technology & Electronic Engineering 2021 Vol.22 No.2 P.244-250 DOI:10.1631/FITEE.1900318 |
| 8 | Identity-based searchable attribute signcryption in lattice for a blockchain-based medical system Author(s):Huifang YU, Xiaoping BAI Clicked:3653 Download:2601 Cited:0 <Full Text> <PPT> 454 Frontiers of Information Technology & Electronic Engineering 2024 Vol.25 No.3 P.461-471 DOI:10.1631/FITEE.2300248 |
| 9 | Odor representation and coding by the mitral/tufted cells in the olfactory bulb Author(s):Panke WANG, Shan LI, An’an LI Clicked:2604 Download:2119 Cited:0 <Full Text> <PPT> 757 Journal of Zhejiang University Science B 2024 Vol.25 No.10 P.824-840 DOI:10.1631/jzus.B2400051 |
| 10 | Anti-quantum cross-chain identity authentication approach using dynamic group signature Author(s):Huifang YU, Mengjie HUANG Clicked:1731 Download:3066 Cited:0 <Full Text> <PPT> 547 Frontiers of Information Technology & Electronic Engineering 2025 Vol.26 No.5 P.742-752 DOI:10.1631/FITEE.2400443 |
