Journal of Zhejiang University


  

Advanced Search



10 results found in all.
index Title
1Non-interactive identity-based threshold signature scheme without random oracles
Author(s):Xun SUN, Jian-hua LI, Shu-tang YANG, Gong-liang CHEN  Clicked:7183  Download:4006  Cited:4  <Full Text>
Journal of Zhejiang University Science A  2008 Vol.9 No.6 P.727-736  DOI:10.1631/jzus.A0720028
2CCA2 secure biometric identity based encryption with constant-size ciphertext
Author(s):Yang Yang, Yu-pu Hu, Le-you Zhang, Chun-hui Sun  Clicked:10211  Download:4330  Cited:1  <Full Text>
Journal of Zhejiang University Science C  2011 Vol.12 No.10 P.819-827  DOI:10.1631/jzus.C1000429
3NaEPASC: a novel and efficient public auditing scheme for cloud data
Author(s):Shuang Tan, Yan Jia  Clicked:12415  Download:8748  Cited:7  <Full Text>  <PPT> 3034
Journal of Zhejiang University Science C  2014 Vol.15 No.9 P.794-804  DOI:10.1631/jzus.C1400045
4Efficient identity-based signature over NTRU lattice
Author(s):Jia Xie, Yu-pu Hu, Jun-tao Gao, Wen Gao  Clicked:9821  Download:4147  Cited:4  <Full Text>  <PPT> 2496
Frontiers of Information Technology & Electronic Engineering  2016 Vol.17 No.2 P.135-142  DOI:10.1631/FITEE.1500197
5Efficient hierarchical identity based encryption scheme in the standard model over lattices
Author(s):Feng-he Wang, Chun-xiao Wang, Zhen-hua Liu  Clicked:9252  Download:4095  Cited:0  <Full Text>  <PPT> 2491
Frontiers of Information Technology & Electronic Engineering  2016 Vol.17 No.8 P.781-791  DOI:10.1631/FITEE.1500219
6A novel algorithm to counter cross-eye jamming based on a multi-target model
Author(s):Zhi-yong Song, Xing-lin Shen, Qiang Fu  Clicked:8323  Download:3456  Cited:0  <Full Text>  <PPT> 2194
Frontiers of Information Technology & Electronic Engineering  2019 Vol.20 No.7 P.988-1001  DOI:10.1631/FITEE.1800394
7Novel efficient identity-based signature on lattices
Author(s):Jiang-shan Chen, Yu-pu Hu, Hong-mei Liang, Wen Gao  Clicked:8419  Download:7570  Cited:0  <Full Text>  <PPT> 2069
Frontiers of Information Technology & Electronic Engineering  2021 Vol.22 No.2 P.244-250  DOI:10.1631/FITEE.1900318
8Identity-based searchable attribute signcryption in lattice for a blockchain-based medical system
Author(s):Huifang YU, Xiaoping BAI  Clicked:3653  Download:2601  Cited:0  <Full Text>  <PPT> 454
Frontiers of Information Technology & Electronic Engineering  2024 Vol.25 No.3 P.461-471  DOI:10.1631/FITEE.2300248
9Odor representation and coding by the mitral/tufted cells in the olfactory bulb
Author(s):Panke WANG, Shan LI, An’an LI  Clicked:2604  Download:2119  Cited:0  <Full Text>  <PPT> 757
Journal of Zhejiang University Science B  2024 Vol.25 No.10 P.824-840  DOI:10.1631/jzus.B2400051
10Anti-quantum cross-chain identity authentication approach using dynamic group signature
Author(s):Huifang YU, Mengjie HUANG  Clicked:1731  Download:3066  Cited:0  <Full Text>  <PPT> 547
Frontiers of Information Technology & Electronic Engineering  2025 Vol.26 No.5 P.742-752  DOI:10.1631/FITEE.2400443
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2026 Journal of Zhejiang University-SCIENCE