Zhenchao Zhu

According to our database1, Zhenchao Zhu authored at least 16 papers between 2008 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
On Scalable Source Coding Problem with Side Information Privacy.
Proceedings of the 14th International Conference on Wireless Communications and Signal Processing, 2022

2021
Detection Algorithm of the Mimicry Attack based on Variational Auto-Encoder.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2021

Authenticating Mobile Wireless Device Through Per-packet Channel State Information.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2021

2015
Improving the security of protocols of quantum key agreement solely using Bell states and Bell measurement.
Quantum Inf. Process., 2015

2014
Fast and Secure Handover Authentication Scheme Based on Ticket for WiMAX and WiFi Heterogeneous Networks.
Wirel. Pers. Commun., 2014

A Privacy Preserving Vertical Handover Authentication Scheme for WiMAX-WiFi Networks.
KSII Trans. Internet Inf. Syst., 2014

2013
GHAP: An Efficient Group-based Handover Authentication Mechanism for IEEE 802.16m Networks.
Wirel. Pers. Commun., 2013

Cryptanalysis of a new circular quantum secret sharing protocol for remote agents.
Quantum Inf. Process., 2013

A Secure and Efficient Fault-Tolerant Group Key Agreement Protocol.
Proceedings of the 12th IEEE International Conference on Trust, 2013

2012
A Novel Group-Based Handover Authentication Scheme with Privacy Preservation for Mobile WiMAX Networks.
IEEE Commun. Lett., 2012

An efficient handover authentication scheme with privacy preservation for IEEE 802.16m network.
Comput. Secur., 2012

2011
EKMP: An enhanced key management protocol for IEEE 802.16m.
Proceedings of the 2011 IEEE Wireless Communications and Networking Conference, 2011

2010
A Fast Handover Authentication Mechanism Based on Ticket for IEEE 802.16m.
IEEE Commun. Lett., 2010

2009
An efficient and provable secure identity-based ring signcryption scheme.
Comput. Stand. Interfaces, 2009

2008
An Efficient Identity-based Ring Signcryption Scheme.
IACR Cryptol. ePrint Arch., 2008

The Analysis of an Efficient and Provably Secure ID-Based Threshold Signcryption Scheme and Its Secure Version.
Proceedings of the Provable Security, Second International Conference, 2008


  Loading...