| index | Title |
| 1 | Non-interactive identity-based threshold signature scheme without random oracles Author(s):Xun SUN, Jian-hua LI, Shu-tang YANG, Gong-liang CHEN Clicked:7215 Download:4029 Cited:4 <Full Text> Journal of Zhejiang University Science A 2008 Vol.9 No.6 P.727-736 DOI:10.1631/jzus.A0720028 |
| 2 | CCA2 secure biometric identity based encryption with constant-size ciphertext Author(s):Yang Yang, Yu-pu Hu, Le-you Zhang, Chun-hui Sun Clicked:10263 Download:4384 Cited:1 <Full Text> Journal of Zhejiang University Science C 2011 Vol.12 No.10 P.819-827 DOI:10.1631/jzus.C1000429 |
| 3 | NaEPASC: a novel and efficient public auditing scheme for cloud data Author(s):Shuang Tan, Yan Jia Clicked:12456 Download:8832 Cited:7 <Full Text> <PPT> 3045 Journal of Zhejiang University Science C 2014 Vol.15 No.9 P.794-804 DOI:10.1631/jzus.C1400045 |
| 4 | Efficient identity-based signature over NTRU lattice Author(s):Jia Xie, Yu-pu Hu, Jun-tao Gao, Wen Gao Clicked:9875 Download:4202 Cited:4 <Full Text> <PPT> 2505 Frontiers of Information Technology & Electronic Engineering 2016 Vol.17 No.2 P.135-142 DOI:10.1631/FITEE.1500197 |
| 5 | Efficient hierarchical identity based encryption scheme in the standard model over lattices Author(s):Feng-he Wang, Chun-xiao Wang, Zhen-hua Liu Clicked:9312 Download:4166 Cited:0 <Full Text> <PPT> 2511 Frontiers of Information Technology & Electronic Engineering 2016 Vol.17 No.8 P.781-791 DOI:10.1631/FITEE.1500219 |
| 6 | A novel algorithm to counter cross-eye jamming based on a multi-target model Author(s):Zhi-yong Song, Xing-lin Shen, Qiang Fu Clicked:8388 Download:3512 Cited:0 <Full Text> <PPT> 2201 Frontiers of Information Technology & Electronic Engineering 2019 Vol.20 No.7 P.988-1001 DOI:10.1631/FITEE.1800394 |
| 7 | Novel efficient identity-based signature on lattices Author(s):Jiang-shan Chen, Yu-pu Hu, Hong-mei Liang, Wen Gao Clicked:8465 Download:7644 Cited:0 <Full Text> <PPT> 2076 Frontiers of Information Technology & Electronic Engineering 2021 Vol.22 No.2 P.244-250 DOI:10.1631/FITEE.1900318 |
| 8 | Identity-based searchable attribute signcryption in lattice for a blockchain-based medical system Author(s):Huifang YU, Xiaoping BAI Clicked:3725 Download:2673 Cited:0 <Full Text> <PPT> 469 Frontiers of Information Technology & Electronic Engineering 2024 Vol.25 No.3 P.461-471 DOI:10.1631/FITEE.2300248 |
| 9 | Odor representation and coding by the mitral/tufted cells in the olfactory bulb Author(s):Panke WANG, Shan LI, An’an LI Clicked:2661 Download:2188 Cited:0 <Full Text> <PPT> 778 Journal of Zhejiang University Science B 2024 Vol.25 No.10 P.824-840 DOI:10.1631/jzus.B2400051 |
| 10 | Anti-quantum cross-chain identity authentication approach using dynamic group signature Author(s):Huifang YU, Mengjie HUANG Clicked:1785 Download:3199 Cited:0 <Full Text> <PPT> 570 Frontiers of Information Technology & Electronic Engineering 2025 Vol.26 No.5 P.742-752 DOI:10.1631/FITEE.2400443 |
