Changlu Lin
Orcid: 0000-0002-2868-3398
According to our database1,
Changlu Lin
authored at least 57 papers
between 2008 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
Comput. Stand. Interfaces, 2025
2024
BAKAS-UAV: A Secure Blockchain-Assisted Authentication and Key Agreement Scheme for Unmanned Aerial Vehicles Networks.
IEEE Internet Things J., November, 2024
A threshold changeable dynamic quantum secret sharing scheme with cheating identification.
Quantum Inf. Process., October, 2024
Quantum Inf. Process., May, 2024
Efficient and Verifiable General Quantum Secret Sharing Based on Special Entangled State.
IEEE Internet Things J., April, 2024
2023
J. Syst. Sci. Complex., February, 2023
ABAEKS: Attribute-Based Authenticated Encryption With Keyword Search Over Outsourced Encrypted Data.
IEEE Trans. Inf. Forensics Secur., 2023
Des. Codes Cryptogr., 2023
Proceedings of the 19th International Conference on Mobility, Sensing and Networking, 2023
2022
The homogeneous distance of $$(1+u^2)$$-constacyclic codes over $$\mathbb {F}_2[u]/\langle u^3\rangle $$ and its applications.
J. Appl. Math. Comput., February, 2022
IEEE Trans. Inf. Theory, 2022
Inf. Sci., 2022
Comput. J., 2022
Proceedings of the ICT Systems Security and Privacy Protection, 2022
2021
Verifiable, Reliable, and Privacy-Preserving Data Aggregation in Fog-Assisted Mobile Crowdsensing.
IEEE Internet Things J., 2021
2020
Int. J. Netw. Secur., 2020
Zero-pole cancellation for identity-based aggregators: a constant-size designated verifier-set signature.
Frontiers Comput. Sci., 2020
IEEE Access, 2020
Proceedings of the Provable and Practical Security - 14th International Conference, ProvSec 2020, Singapore, November 29, 2020
2019
IET Inf. Secur., 2019
IEEE Access, 2019
2018
IEEE Commun. Lett., 2018
A Publicly Verifiable Multi-Secret Sharing Scheme With Outsourcing Secret Reconstruction.
IEEE Access, 2018
Leveled Hierarchical Identity-Based Fully Homomorphic Encryption from Learning with Rounding.
Proceedings of the Information Security Practice and Experience, 2018
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
2017
J. Inf. Sci. Eng., 2017
2016
J. Inf. Sci. Eng., 2016
Int. J. Netw. Secur., 2016
Int. J. Netw. Secur., 2016
Proceedings of the Green, Pervasive, and Cloud Computing - 11th International Conference, 2016
2015
基于FOO投票协议的无收据电子投票方案 (Receipt-freeness Electronic Voting Scheme Based on FOO Voting Protocol).
计算机科学, 2015
Proceedings of the Information Security and Cryptology - 11th International Conference, 2015
2014
Secur. Commun. Networks, 2014
The design of dynamic access control for hierarchical sensor networks with key-lock-pair mechanism.
Int. J. Ad Hoc Ubiquitous Comput., 2014
2013
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
2012
Proceedings of the Network and System Security - 6th International Conference, 2012
Proceedings of the 8th International Conference on Mobile Ad-hoc and Sensor Networks, 2012
2011
Comput. J., 2011
Identity-Based Strong Designated Verifier Signature Scheme with Full Non-Delegatability.
Proceedings of the IEEE 10th International Conference on Trust, 2011
2010
IEEE Trans. Computers, 2010
Efficient On-line/Off-line Signature Schemes Based on Multiple-Collision Trapdoor Hash Families.
Comput. J., 2010
2009
Detection and identification of cheaters in ( <i>t</i> , <i>n</i> ) secret sharing scheme.
Des. Codes Cryptogr., 2009
Information-theoretically Secure Strong Verifiable Secret Sharing.
Proceedings of the SECRYPT 2009, 2009
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
2008
Anonymous Identity Based Encryption with Plaintext Awareness in the Two Identities Setting.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008