Search scope:
排序: Display mode:
ImgFS: a transparent cryptography for stored images using a filesystem in userspace
Osama A. KHASHAN,Abdullah M. ZIN,Elankovan A. SUNDARARAJAN
Frontiers of Information Technology & Electronic Engineering 2015, Volume 16, Issue 1, Pages 28-42 doi: 10.1631/FITEE.1400133
Keywords: Storage image security Cryptographic file system Filesystem in userspace (FUSE) Transparent encryption
NICFS: a file system based on persistent memory and SmartNIC Research Article
Zhiwang YU, Runyu ZHANG, Chaoshu YANG, Shun NIE, Duo LIU,zhangry@gzu.edu.cn,csyang@gzu.edu.cn
Frontiers of Information Technology & Electronic Engineering 2023, Volume 24, Issue 5, Pages 688-702 doi: 10.1631/FITEE.2200468
Keywords: File system Persistent memory Wear-leveling Multi-grained allocator
ONFS: a hierarchical hybrid file system based on memory, SSD, and HDD for high performance computers None
Xin LIU, Yu-tong LU, Jie YU, Peng-fei WANG, Jie-ting WU, Ying LU
Frontiers of Information Technology & Electronic Engineering 2018, Volume 19, Issue 2, doi: 10.1631/FITEE.17e0626
Keywords: None
& Research Article
Yitian YANG, Youyou LU,yangyiti22@mails.tsinghua.edu.cn,luyouyou@tsinghua.edu.cn
Frontiers of Information Technology & Electronic Engineering 2023, Volume 24, Issue 5, Pages 675-687 doi: 10.1631/FITEE.2200469
Keywords: Non-volatile memory Persistent memory Data processing unit Smart network interface card (SmartNIC) Filesystem
ONFS: a hierarchical hybrid file system based on memory, SSD, andHDDfor high performance computers Article
Xin LIU, Yu-tong LU, Jie YU, Peng-fei WANG, Jie-ting WU, Ying LU
Frontiers of Information Technology & Electronic Engineering 2017, Volume 18, Issue 12, Pages 1940-1971 doi: 10.1631/FITEE.1700626
Keywords: High performance computing Hierarchical hybrid storage system Distributed metadata management Data
Anovel non-volatile memory storage system for I/O-intensive applications None
Wen-bing HAN, Xiao-gang CHEN, Shun-fen LI, Ge-zi LI, Zhi-tang SONG, Da-gang LI, Shi-yan CHEN
Frontiers of Information Technology & Electronic Engineering 2018, Volume 19, Issue 10, Pages 1291-1302 doi: 10.1631/FITEE.1700061
Keywords: In-storage processing File system Non-volatile memory (NVM) Storage system I/O-intensive applications
The Constructions of Cryptographic Functions
Teng Jihong,Zhang Wenying,Liu Wenfen,Li Shiqu
Strategic Study of CAE 2003, Volume 5, Issue 7, Pages 47-52
Keywords: Walsh spectrum decomposition formula of Walsh spectrum Bent function resilient function strict avalanche criterion
Dynamic analysis, FPGA implementation, and cryptographic application of an autonomous 5D chaotic system Research Articles
Sifeu Takougang Kingni, Karthikeyan Rajagopal, Serdar Çiçek, Ashokkumar Srinivasan, Anitha Karthikeyan,stkingni@gmail.com
Frontiers of Information Technology & Electronic Engineering 2020, Volume 21, Issue 6, Pages 809-962 doi: 10.1631/FITEE.1900167
Keywords: 混沌系统;霍普夫分岔;共存吸引子;偏置增强;FPGA实现;声音加密
Yang Rui,Zeng Bensheng,Li Shiqu
Strategic Study of CAE 2005, Volume 7, Issue 11, Pages 60-65
The paper made an analysis of the similarities and differences about the cryptographic properties
Keywords: linear equivalence Walsh cycle spectrum self-correlation function correlation-immunity propagation criterion SAC
Nanoscale cryptographic architecture design using quantum-dot cellular automata Regular Article
Bikash Debnath, Jadav Chandra Das, Debashis De,dr.debashis.de@gmail.com
Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 11, Pages 1578-1586 doi: 10.1631/FITEE.1800458
Keywords: 量子点元胞自动机(QCA);多数决定门密码学;加密;解密;纳米级路由
The Cryptographic Properties of Select Logic Functions
Liang Zeng,Li Shiqu
Strategic Study of CAE 2005, Volume 7, Issue 7, Pages 50-54
In this paper, the main results are concerned with the Walsh transform and the autocorrelation function of select logic functions. Select logic functions with large number of variables have perfect stability and can resist towards cryptanalysis of best affine approximation, but they can't resist towards differential cryptanalysis efficiently because of weak propagation property. By a linear transformation of coordinates, an explicit construction for functions satisfying the strict avalanche criterion or Being correlation immune is provided.
Keywords: select logic function Walsh transform autocorrelation function strict avalanche criterion correlation immune probability expressions
Current Status and Future Development of Quantum Cryptographic Protocols
Zhang Xue, Gao Fei, Qin Sujuan, Zhang Ping
Strategic Study of CAE 2022, Volume 24, Issue 4, Pages 145-155 doi: 10.15302/J-SSCAE-2022.04.015
Note: Barrel capacity represents information system securityA QKD system consists of a transmitter, a receiver, and the channels that connect each.At the application level, a new cryptographic system combining quantum and classical cryptography issystem that combines quantum and classical cryptography.Further significant research is required to establish a mature and practical protocol system.
Keywords: quantum cryptography protocols quantum key distribution quantum digital signature quantum private query
An efficient wear-leveling-aware multi-grained allocator for persistent memory file systems Research Article
Tao CAI, Pengfei GAO, Dejiao NIU, Yueming MA, Tianle LEI, Jianfei DAI,caitao@ujs.edu.cn,1306943800@qq.com
Frontiers of Information Technology & Electronic Engineering 2023, Volume 24, Issue 5, Pages 703-715 doi: 10.1631/FITEE.2200462
Keywords: Extendible hashing Non-volatile memory (NVM) High concurrency
An energy-efficient reconfigurable asymmetric modular cryptographic operation unit for RSA and ECC Research Article
Mengni BIE, Wei LI, Tao CHEN, Longmei NAN, Danyang YANG,raspberry0213@126.com,liwei12@fudan.edu.cn
Frontiers of Information Technology & Electronic Engineering 2022, Volume 23, Issue 1, Pages 134-144 doi: 10.1631/FITEE.2000325
Keywords: Modular operation unit Reconfigurable High energy efficiency
System reliability and system resilience
Frontiers of Engineering Management 2021, Volume 8, Issue 4, Pages 615-619 doi: 10.1007/s42524-021-0176-y
Title Author Date Type Operation
ImgFS: a transparent cryptography for stored images using a filesystem in userspace
Osama A. KHASHAN,Abdullah M. ZIN,Elankovan A. SUNDARARAJAN
Journal Article
NICFS: a file system based on persistent memory and SmartNIC
Zhiwang YU, Runyu ZHANG, Chaoshu YANG, Shun NIE, Duo LIU,zhangry@gzu.edu.cn,csyang@gzu.edu.cn
Journal Article
ONFS: a hierarchical hybrid file system based on memory, SSD, and HDD for high performance computers
Xin LIU, Yu-tong LU, Jie YU, Peng-fei WANG, Jie-ting WU, Ying LU
Journal Article
ONFS: a hierarchical hybrid file system based on memory, SSD, andHDDfor high performance computers
Xin LIU, Yu-tong LU, Jie YU, Peng-fei WANG, Jie-ting WU, Ying LU
Journal Article
Anovel non-volatile memory storage system for I/O-intensive applications
Wen-bing HAN, Xiao-gang CHEN, Shun-fen LI, Ge-zi LI, Zhi-tang SONG, Da-gang LI, Shi-yan CHEN
Journal Article
The Constructions of Cryptographic Functions
Teng Jihong,Zhang Wenying,Liu Wenfen,Li Shiqu
Journal Article
Dynamic analysis, FPGA implementation, and cryptographic application of an autonomous 5D chaotic system
Sifeu Takougang Kingni, Karthikeyan Rajagopal, Serdar Çiçek, Ashokkumar Srinivasan, Anitha Karthikeyan,stkingni@gmail.com
Journal Article
Characteristic of Spectrum and Self-correlation of Some Boolean Fuctions Linearly Equivalent to Specific Cryptographic
Yang Rui,Zeng Bensheng,Li Shiqu
Journal Article
Nanoscale cryptographic architecture design using quantum-dot cellular automata
Bikash Debnath, Jadav Chandra Das, Debashis De,dr.debashis.de@gmail.com
Journal Article
Current Status and Future Development of Quantum Cryptographic Protocols
Zhang Xue, Gao Fei, Qin Sujuan, Zhang Ping
Journal Article
An efficient wear-leveling-aware multi-grained allocator for persistent memory file systems
Tao CAI, Pengfei GAO, Dejiao NIU, Yueming MA, Tianle LEI, Jianfei DAI,caitao@ujs.edu.cn,1306943800@qq.com
Journal Article
An energy-efficient reconfigurable asymmetric modular cryptographic operation unit for RSA and ECC
Mengni BIE, Wei LI, Tao CHEN, Longmei NAN, Danyang YANG,raspberry0213@126.com,liwei12@fudan.edu.cn
Journal Article