Advanced Search



24 results found in all.
index Title
1Protection of mobile location privacy by using blind signature
Author(s):LIAO Jian, QI Ying-hao, HUANG Pei-wei, RONG Meng-tian, LI Sheng-hong  Clicked:6303  Download:3856  Cited:43  <Full Text>
Journal of Zhejiang University Science A  2006 Vol.7 No.6 P.984-989  DOI:10.1631/jzus.2006.A0984
2ε-inclusion: privacy preserving re-publication of dynamic datasets
Author(s):Qiong WEI, Yan-sheng LU, Lei ZOU  Clicked:5985  Download:3284  Cited:2  <Full Text>
Journal of Zhejiang University Science A  2008 Vol.9 No.8 P.1124-1133  DOI:10.1631/jzus.A071595
3Distributed anonymous data perturbation method for privacy-preserving data mining
Author(s):Feng LI, Jin MA, Jian-hua LI  Clicked:7190  Download:5448  Cited:3  <Full Text>
Journal of Zhejiang University Science A  2009 Vol.10 No.7 P.952-963  DOI:10.1631/jzus.A0820320
4A MUTUAL NON-REPUDIATION PROTOCOL WITH PRIVACY
Author(s):JIANG Xiao-ning, YE Cheng-qing  Clicked:5522  Download:2993  Cited:0  <Full Text>
Journal of Zhejiang University Science  2000 Vol.1 No.3 P.317-321  DOI:10.1631/jzus.2000.0317
5EDA: an enhanced dual-active algorithm for location privacy preservation in mobile P2P networks
Author(s):Yan-zhe Che, Kevin Chiew, Xiao-yan Hong, Qiang Yang, Qin-ming He  Clicked:8601  Download:3776  Cited:0  <Full Text>
Journal of Zhejiang University Science C  2013 Vol.14 No.5 P.356-373  DOI:10.1631/jzus.C1200267
6Analysis and design of a smart card based authentication protocol
Author(s):Kuo-Hui Yeh, Kuo-Yu Tsai, Jia-Li Hou  Clicked:9478  Download:3743  Cited:0  <Full Text>  <PPT> 2387
Journal of Zhejiang University Science C  2013 Vol.14 No.12 P.909-917  DOI:10.1631/jzus.C1300158
7A lightweight authentication scheme with user untraceability
Author(s):Kuo-Hui Yeh  Clicked:9130  Download:3589  Cited:2  <Full Text>  <PPT> 2635
Frontiers of Information Technology & Electronic Engineering  2015 Vol.16 No.4 P.259-271  DOI:10.1631/FITEE.1400232
8Towards a respondent-preferred ki-anonymity model
Author(s):Kok-Seng Wong, Myung Ho Kim  Clicked:7966  Download:2902  Cited:2  <Full Text>  <PPT> 2179
Frontiers of Information Technology & Electronic Engineering  2015 Vol.16 No.9 P.720-731  DOI:10.1631/FITEE.1400395
9Cryptanalysis of an identity-based public auditing protocol for cloud storage
Author(s):Li-bing Wu, Jing Wang, De-biao He, Muhammad-Khurram Khan  Clicked:9324  Download:3282  Cited:0  <Full Text>  <PPT> 2665
Frontiers of Information Technology & Electronic Engineering  2017 Vol.18 No.12 P.1972-1977  DOI:10.1631/FITEE.1601530
10Preserving privacy information flow security in composite service evolution
Author(s):Huan-feng Peng, Zhi-qiu Huang, Lin-yuan Liu, Yong Li, Da-juan Fan, Yu-qing Wang  Clicked:7776  Download:2522  Cited:0  <Full Text>  <PPT> 1918
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.5 P.626-638  DOI:10.1631/FITEE.1700359
11Generic user revocation systems for attribute-based encryption in cloud storage
Author(s):Genlang Chen, Zhiqian Xu, Hai Jiang, Kuan-ching Li  Clicked:7923  Download:3108  Cited:0  <Full Text>  <PPT> 2361
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.11 P.1362-1384  DOI:10.1631/FITEE.1800405
12Faster fog-aided private set intersection with integrity preserving
Author(s):Qiang Wang, Fu-cai Zhou, Tie-min Ma, Zi-feng Xu  Clicked:6181  Download:3141  Cited:0  <Full Text>  <PPT> 2012
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.12 P.1558-1568  DOI:10.1631/FITEE.1800518
13Generic attribute revocation systems for attribute-based encryption in cloud storage
Author(s):Genlang Chen, Zhiqian Xu, Jia-jian Zhang, Guo-jun Wang, Hai Jiang, Miao-qing Huang  Clicked:8853  Download:2608  Cited:0  <Full Text>  <PPT> 2278
Frontiers of Information Technology & Electronic Engineering  2019 Vol.20 No.6 P.773-786  DOI:10.1631/FITEE.1800512
14Privacy and security federated reference architecture for Internet of Things
Author(s):Musab KAMAL, Imran RASHID, Waseem IQBAL, Muhammad Haroon SIDDIQUI, Sohaib KHAN, Ijaz AHMAD  Clicked:3516  Download:11293  Cited:0  <Full Text>  <PPT> 614
Frontiers of Information Technology & Electronic Engineering  2023 Vol.24 No.4 P.481-508  DOI:10.1631/FITEE.2200368
15TPE-H2MWD: an exact thumbnail preserving encryption scheme with hidden Markov model and weighted diffusion
Author(s):Xiuli CHAI, Xiuhui CHEN, Yakun MA, Fang ZUO, Zhihua GAN, Yushu ZHANG  Clicked:3610  Download:3163  Cited:0  <Full Text>  <PPT> 817
Frontiers of Information Technology & Electronic Engineering  2023 Vol.24 No.8 P.1169-1180  DOI:10.1631/FITEE.2200498
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2025 Journal of Zhejiang University-SCIENCE