Bingsheng Zhang
Orcid: 0000-0002-2320-9582
According to our database1,
Bingsheng Zhang
authored at least 87 papers
between 2009 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
Single-Input Functionality against a Dishonest Majority: Practical and Round-Optimal.
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
Scalable Collaborative zk-SNARK: Fully Distributed Proof Generation and Malicious Security.
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
2023
A meta-analysis of the efficacy of self-regulated learning interventions on academic achievement in online and blended environments in K-12 and higher education.
Behav. Inf. Technol., December, 2023
IEEE Trans. Inf. Forensics Secur., 2023
iPrivJoin: An ID-Private Data Join Framework for Privacy-Preserving Machine Learning.
IEEE Trans. Inf. Forensics Secur., 2023
IEEE Trans. Inf. Forensics Secur., 2023
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
Aegis: A Lightning Fast Privacy-preserving Machine Learning Platform against Malicious Adversaries.
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
2022
IEEE Trans. Inf. Forensics Secur., 2022
IEEE Trans. Dependable Secur. Comput., 2022
J. Comput. Secur., 2022
Improvements on Non-Interactive Zero-Knowledge Proof Systems Related to Quadratic Residuosity Languages.
Inf. Sci., 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
PANDA: Lightweight non-interactive privacy-preserving data aggregation for constrained devices.
Future Gener. Comput. Syst., 2022
2021
IACR Cryptol. ePrint Arch., 2021
CoRR, 2021
Proceedings of the Computer Security - ESORICS 2021, 2021
Proceedings of the Computer Security - ESORICS 2021, 2021
Correlated Randomness Teleportation via Semi-trusted Hardware - Enabling Silent Multi-party Computation.
Proceedings of the Computer Security - ESORICS 2021, 2021
2020
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
Proceedings of the 28th IEEE/ACM International Symposium on Quality of Service, 2020
2019
Comput. Secur., 2019
Recessive Social Networking: Preventing Privacy Leakage against Reverse Image Search.
Proceedings of the 2019 IEEE European Symposium on Security and Privacy Workshops, 2019
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019
Proceedings of the 7th International Workshop on Security in Cloud Computing, 2019
2018
IACR Cryptol. ePrint Arch., 2018
Towards everlasting privacy and efficient coercion resistance in remote electronic voting.
IACR Cryptol. ePrint Arch., 2018
Uncontrolled Randomness in Blockchains: Covert Bulletin Board for Illicit Activities.
IACR Cryptol. ePrint Arch., 2018
Proceedings of the 2018 IEEE International Conference on Data Mining Workshops, 2018
2017
IEEE Secur. Priv., 2017
IACR Cryptol. ePrint Arch., 2017
Proceedings of the ACM Symposium on Principles of Distributed Computing, 2017
2016
IEEE Trans. Mob. Comput., 2016
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems, 2016
2015
IACR Cryptol. ePrint Arch., 2015
Proceedings of the E-Democracy - Citizen Rights in the World of the New Computing Paradigms, 2015
Proceedings of the 2015 IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
IEEE Trans. Inf. Forensics Secur., 2014
IEEE Internet Things J., 2014
IACR Cryptol. ePrint Arch., 2014
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014
Proceedings of the 2014 Proceedings IEEE INFOCOM Workshops, Toronto, ON, Canada, April 27, 2014
Pressing the button for European elections: verifiable e-voting and public attitudes toward internet voting in Greece.
Proceedings of the 6th International Conference on Electronic Voting: Verifying the Vote, 2014
2013
IEEE Trans. Emerg. Top. Comput., 2013
A more efficient computationally sound non-interactive zero-knowledge shuffle argument.
J. Comput. Secur., 2013
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
Proceedings of the Financial Cryptography and Data Security, 2013
Proceedings of the E-Democracy, Security, Privacy and Trust in a Digital World, 2013
Proceedings of the Cryptology and Network Security - 12th International Conference, 2013
2012
New Non-Interactive Zero-Knowledge Subset Sum, Decision Knapsack And Range Arguments.
IACR Cryptol. ePrint Arch., 2012
Proceedings of the Financial Cryptography and Data Security, 2012
2011
Proceedings of the Provable Security - 5th International Conference, 2011
Proceedings of the Provable Security - 5th International Conference, 2011
2010
Proceedings of the Progress in Cryptology - INDOCRYPT 2010, 2010
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010
2009
Efficient Generalized Selective Private Function Evaluation with Applications in Biometric Authentication.
Proceedings of the Information Security and Cryptology - 5th International Conference, 2009
Proceedings of the Cryptology and Network Security, 8th International Conference, 2009