Advanced Search



10 results found in all.
index Title
1Non-interactive identity-based threshold signature scheme without random oracles
Author(s):Xun SUN, Jian-hua LI, Shu-tang YANG, Gong-liang CHEN  Clicked:6649  Download:3683  Cited:4  <Full Text>
Journal of Zhejiang University Science A  2008 Vol.9 No.6 P.727-736  DOI:10.1631/jzus.A0720028
2CCA2 secure biometric identity based encryption with constant-size ciphertext
Author(s):Yang Yang, Yu-pu Hu, Le-you Zhang, Chun-hui Sun  Clicked:9293  Download:4041  Cited:1  <Full Text>
Journal of Zhejiang University Science C  2011 Vol.12 No.10 P.819-827  DOI:10.1631/jzus.C1000429
3NaEPASC: a novel and efficient public auditing scheme for cloud data
Author(s):Shuang Tan, Yan Jia  Clicked:11414  Download:7080  Cited:7  <Full Text>  <PPT> 2574
Journal of Zhejiang University Science C  2014 Vol.15 No.9 P.794-804  DOI:10.1631/jzus.C1400045
4Efficient identity-based signature over NTRU lattice
Author(s):Jia Xie, Yu-pu Hu, Jun-tao Gao, Wen Gao  Clicked:8539  Download:3189  Cited:4  <Full Text>  <PPT> 2249
Frontiers of Information Technology & Electronic Engineering  2016 Vol.17 No.2 P.135-142  DOI:10.1631/FITEE.1500197
5Efficient hierarchical identity based encryption scheme in the standard model over lattices
Author(s):Feng-he Wang, Chun-xiao Wang, Zhen-hua Liu  Clicked:7415  Download:3080  Cited:0  <Full Text>  <PPT> 2123
Frontiers of Information Technology & Electronic Engineering  2016 Vol.17 No.8 P.781-791  DOI:10.1631/FITEE.1500219
6A novel algorithm to counter cross-eye jamming based on a multi-target model
Author(s):Zhi-yong Song, Xing-lin Shen, Qiang Fu  Clicked:7433  Download:2590  Cited:0  <Full Text>  <PPT> 1873
Frontiers of Information Technology & Electronic Engineering  2019 Vol.20 No.7 P.988-1001  DOI:10.1631/FITEE.1800394
7Novel efficient identity-based signature on lattices
Author(s):Jiang-shan Chen, Yu-pu Hu, Hong-mei Liang, Wen Gao  Clicked:7073  Download:6269  Cited:0  <Full Text>  <PPT> 1791
Frontiers of Information Technology & Electronic Engineering  2021 Vol.22 No.2 P.244-250  DOI:10.1631/FITEE.1900318
8Identity-based searchable attribute signcryption in lattice for a blockchain-based medical system
Author(s):Huifang YU, Xiaoping BAI  Clicked:2638  Download:1535  Cited:0  <Full Text>  <PPT> 18
Frontiers of Information Technology & Electronic Engineering  2024 Vol.25 No.3 P.461-471  DOI:10.1631/FITEE.2300248
9Odor representation and coding by the mitral/tufted cells in the olfactory bulb
Author(s):Panke WANG, Shan LI, An’an LI  Clicked:1352  Download:1143  Cited:0  <Full Text>  <PPT> 449
Journal of Zhejiang University Science B  2024 Vol.25 No.10 P.824-840  DOI:10.1631/jzus.B2400051
10Anti-quantum cross-chain identity authentication approach using dynamic group signature
Author(s):Huifang YU, Mengjie HUANG  Clicked:667  Download:1126  Cited:0  <Full Text>  <PPT> 226
Frontiers of Information Technology & Electronic Engineering  2025 Vol.26 No.5 P.742-752  DOI:10.1631/FITEE.2400443
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2025 Journal of Zhejiang University-SCIENCE