Efficient secure channel free identity-based searchable encryption schemes with privacy preserving for cloud storage service.
J. Syst. Archit., 2024
Secure and efficient vehicle data downloading scheme with privacy-preserving in VANETs.
Comput. Networks, 2024
Efficient Data Sharing With Privacy Preservation Over Lattices for Secure Cloud Storage.
IEEE Syst. J., 2022
TABLF-based adaptive control for uncertain nonlinear systems with time-varying asymmetric full-state constraints.
Int. J. Control, 2021
Efficient incremental authentication for the updated data in fog computing.
Future Gener. Comput. Syst., 2021
Constant-size ring signature scheme using multilinear maps.
Int. J. Embed. Syst., 2020
A heat and mass transfer model based on multi-component heterogeneity for corn kernel tempering drying: Development and application.
Comput. Electron. Agric., 2020
Lattice-Based Incremental Signature Scheme for the Authenticated Data Update in Fog Computing.
IEEE Access, 2020
BLF-based asymptotic tracking control for a class of time-varying full state constrained nonlinear systems.
Trans. Inst. Meas. Control, 2019
An anti-eavesdropping scheme for hybrid multicast services with massive MIMO in 5G.
J. Comput. Methods Sci. Eng., 2019
Lattice-Based Encrypted Verifiably Encryption Signature Scheme for the Fair and Private Electronic Commence.
IEEE Access, 2019
Leveled Lattice-Based Linearly Homomorphic Signature Scheme in the Standard Model for Network Coding.
Proceedings of the Frontiers in Cyber Security - Second International Conference, 2019
Post-Quantum Secure Public Key Broadcast Encryption with Keyword Search.
J. Inf. Sci. Eng., 2017
High-performance multicast services in 5G big data network with massive MIMO.
Proceedings of the IEEE International Conference on Communications, 2017
Short and provable secure lattice-based signature scheme in the standard model.
Secur. Commun. Networks, 2016
Efficient hierarchical identity based encryption scheme in the standard model over lattices.
Frontiers Inf. Technol. Electron. Eng., 2016
Full secure identity-based encryption scheme with short public key size over lattices in the standard model.
Int. J. Comput. Math., 2016
New method of key-dependent message security for asymmetric encryption.
Secur. Commun. Networks, 2015
Lattice-based Dynamical and Anonymous Broadcast Encryption Scheme for Wireless Ad Hoc Networks.
J. Interconnect. Networks, 2015
Lattice-Based Dynamical and Anonymous Broadcast Encryption Scheme.
Proceedings of the 10th International Conference on P2P, 2015
Gaussian sampling of lattices for cryptographic applications.
Sci. China Inf. Sci., 2014
Lattice-based linearly homomorphic signature scheme over binary field.
Sci. China Inf. Sci., 2013
Correlation power analysis of Trivium.
Secur. Commun. Networks, 2012
An Attack on a Fully Homomorphic Encryption Scheme.
IACR Cryptol. ePrint Arch., 2012
On cross-correlation indicators of an S-box.
Frontiers Comput. Sci. China, 2011
New construction of identity-based encryption with wildcards.
Proceedings of the International Conference on Electronic and Mechanical Engineering and Information Technology, 2011