Dengzhi Liu

Orcid: 0000-0001-9206-7680

According to our database1, Dengzhi Liu authored at least 34 papers between 2015 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Privacy-preserving dynamic auditing for regenerating code-based storage in cloud-fog-assisted IIoT.
Internet Things, April, 2024

Secure multi-party computation with secret sharing for real-time data aggregation in IIoT.
Comput. Commun., 2024

2023
Secure distributed data integrity auditing with high efficiency in 5G-enabled software-defined edge computing.
Cyber Secur. Appl., December, 2023

Distributed Computation Offloading with Low Latency for Artificial Intelligence in Vehicular Networking.
IEEE Commun. Stand. Mag., March, 2023

Flexible Data Integrity Checking With Original Data Recovery in IoT-Enabled Maritime Transportation Systems.
IEEE Trans. Intell. Transp. Syst., February, 2023

2022
Trustworthiness Evaluation-Based Routing Protocol for Incompletely Predictable Vehicular Ad Hoc Networks.
IEEE Trans. Big Data, 2022

Toward secure distributed data storage with error locating in blockchain enabled edge computing.
Comput. Stand. Interfaces, 2022

2021
Secure Authentication in Cloud Big Data with Hierarchical Attribute Authorization Structure.
IEEE Trans. Big Data, 2021

2020
Secure Real-Time Traffic Data Aggregation With Batch Verification for Vehicular Cloud in VANETs.
IEEE Trans. Veh. Technol., 2020

Algebraic Signatures-Based Data Integrity Auditing for Efficient Data Dynamics in Cloud Computing.
IEEE Trans. Sustain. Comput., 2020

Secure Verifiable Database Supporting Efficient Dynamic Operations in Cloud Computing.
IEEE Trans. Emerg. Top. Comput., 2020

Secure sustainable storage auditing protocol (SSSAP) with efficient key updates for cloud computing.
Sustain. Comput. Informatics Syst., 2020

Efficient data integrity auditing with corrupted data recovery for edge computing in enterprise multimedia security.
Multim. Tools Appl., 2020

Secure real-time image protection scheme with near-duplicate detection in cloud computing.
J. Real Time Image Process., 2020

Efficient cloud-aided verifiable secret sharing scheme with batch verification for smart cities.
Future Gener. Comput. Syst., 2020

Anonymous data collection scheme for cloud-aided mobile edge networks.
Digit. Commun. Networks, 2020

2019
Two-Factor-Based Public Data Protection Scheme in Smart Ocean Management.
Sensors, 2019

Cloud-assisted Two-Factor Protection Mechanism for Public Data in Smart Campus.
Proceedings of the International Conference on Computing, Networking and Communications, 2019

2018
Lightweight and practical node clustering authentication protocol for hierarchical wireless sensor networks.
Int. J. Sens. Networks, 2018

A Novel Authentication Protocol with Tree-based Signature for Green Cloud Computing.
Proceedings of the 2018 International Conference on Computing, 2018

Privacy-Preserving Data Outsourcing with Integrity Auditing for Lightweight Devices in Cloud Computing.
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018

Secure Publicly Verifiable Computation with Polynomial Commitment in Cloud Computing.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018

2017
A secure cloud-assisted urban data sharing framework for ubiquitous-cities.
Pervasive Mob. Comput., 2017

An Enhanced Cloud Data Storage Auditing Protocol Providing Strong Security and Efficiency for Smart City.
J. Inf. Sci. Eng., 2017

S-SurF: An Enhanced Secure Bulk Data Dissemination in Wireless Sensor Networks.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

Enhanced Remote Password-Authenticated Key Agreement Based on Smart Card Supporting Password Changing.
Proceedings of the Information Security Practice and Experience, 2017

A Novel Clustering Solution for Wireless Sensor Networks.
Proceedings of the Green, Pervasive, and Cloud Computing - 12th International Conference, 2017

2016
Greedy Probability-Based Routing Protocol for Incompletely Predictable Vehicular Ad-hoc Network.
Proceedings of the Security, Privacy and Anonymity in Computation, Communication and Storage, 2016

A Survey on the Research of Indoor RFID Positioning System.
Proceedings of the Cloud Computing and Security - Second International Conference, 2016

Localization Technology in Wireless Sensor Networks Using RSSI and LQI: A Survey.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2016

Exploiting Group Signature to Implement User Authentication in Cloud Computing.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2016

2015
A three-tiers service architecture based on outdoor monitoring for epilepsy patients.
Proceedings of the IEEE International Conference on Consumer Electronics - Taiwan, 2015

A novel real-time service architecture based on driver state detecting for improving road safety.
Proceedings of the IEEE International Conference on Consumer Electronics - Taiwan, 2015

A Mobile-Sink Based Energy Efficiency Clustering Routing Algorithm for WSNs in Coal Mine.
Proceedings of the Third International Conference on Advanced Cloud and Big Data, 2015


  Loading...