Dong Zheng
Orcid: 0000-0002-3860-2037Affiliations:
- Xi'an University of Posts and Telecommunications, National Engineering Laboratory for Wireless Security, China
- Shanghai Jiao Tong University, School of Information Security Engineering, China (former)
- Xidian University, Xi'an, China (PhD 1999)
According to our database1,
Dong Zheng
authored at least 154 papers
between 2002 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Covert Communication in a Multirelay-Assisted Wireless Network With an Active Warden.
IEEE Internet Things J., May, 2024
Privacy-Preserving Medical Data Sharing Scheme Based on Two-Party Cloud-Assisted PSI.
IEEE Internet Things J., May, 2024
DRCLAS: An efficient certificateless aggregate signature scheme with dynamic revocation in vehicular ad-hoc networks.
Veh. Commun., 2024
Further construction of even-variable balanced rotation symmetric Boolean functions with optimal algebraic immunity.
Theor. Comput. Sci., 2024
Cooperative Jamming and Relay Selection for Covert Communications in Wireless Relay Systems.
IEEE Trans. Commun., 2024
J. King Saud Univ. Comput. Inf. Sci., 2024
Proceedings of the International Conference on Networking and Network Applications, 2024
Proceedings of the IEEE International Conference on Communications, 2024
2023
A lattice-based designated-server public-key authenticated encryption with keyword search.
J. Syst. Archit., December, 2023
IEEE Trans. Intell. Transp. Syst., November, 2023
Discret. Appl. Math., October, 2023
IEEE Trans. Dependable Secur. Comput., 2023
Searchable Encryption With Autonomous Path Delegation Function and Its Application in Healthcare Cloud.
IEEE Trans. Cloud Comput., 2023
Int. J. Intell. Syst., 2023
Data Secure De-Duplication and Recovery Based on Public Key Encryption With Keyword Search.
IEEE Access, 2023
Proceedings of the 19th International Conference on Mobility, Sensing and Networking, 2023
Proceedings of the IEEE/CIC International Conference on Communications in China, 2023
Proceedings of the IEEE/CIC International Conference on Communications in China, 2023
DP-Loc: A Differential Privacy-Based Indoor Localization Scheme with Bilateral Privacy Protection.
Proceedings of the Information Security and Cryptology - 19th International Conference, 2023
2022
IEEE Trans. Veh. Technol., 2022
Peer-to-Peer Netw. Appl., 2022
Blockchain-Enabled decentralized Attribute-Based access control with policy hiding for smart healthcare.
J. King Saud Univ. Comput. Inf. Sci., 2022
A novel privacy protection scheme for internet of things based on blockchain and privacy set intersection technique.
J. Cloud Comput., 2022
Blockchain-based verifiable privacy-preserving data classification protocol for medical data.
Comput. Stand. Interfaces, 2022
Proceedings of the IEEE/CIC International Conference on Communications in China, 2022
Proceedings of the Cyberspace Safety and Security - 14th International Symposium, 2022
2021
Outsourcing Service Fair Payment Based on Blockchain and Its Applications in Cloud Computing.
IEEE Trans. Serv. Comput., 2021
IEEE Trans. Dependable Secur. Comput., 2021
Publicly Verifiable Outsourcing Computation for QR Decomposition Based on Blockchain.
Secur. Commun. Networks, 2021
A trust-based privacy-preserving friend matching scheme in social Internet of Vehicles.
Peer-to-Peer Netw. Appl., 2021
IEEE Internet Things J., 2021
O<sup>3</sup>-R-CP-ABE: An Efficient and Revocable Attribute-Based Encryption Scheme in the Cloud-Assisted IoMT System.
IEEE Internet Things J., 2021
SPSC: A secure and privacy-preserving autonomous platoon setup and communication scheme.
Trans. Emerg. Telecommun. Technol., 2021
ACM Comput. Surv., 2021
Flexible and anonymous network slicing selection for C-RAN enabled 5G service authentication.
Comput. Commun., 2021
Proceedings of the Provable and Practical Security, 2021
Proceedings of the Information and Communications Security - 23rd International Conference, 2021
2020
An Efficient Searchable Public-Key Authenticated Encryption for Cloud-Assisted Medical Internet of Things.
Wirel. Commun. Mob. Comput., 2020
Cloud-Assisted Attribute-Based Data Sharing with Efficient User Revocation in the Internet of Things.
IEEE Wirel. Commun., 2020
An attribute-based encryption scheme with multiple authorities on hierarchical personal health record in cloud.
J. Supercomput., 2020
Public-key authenticated encryption with keyword search revisited: Security model and constructions.
Inf. Sci., 2020
SPIR: A Secure and Privacy-Preserving Incentive Scheme for Reliable Real-Time Map Updates.
IEEE Internet Things J., 2020
An Efficient Mobile Location-based Service Framework for Resource-constrained Devices.
Int. J. Netw. Secur., 2020
A Novel Blockchain-based Anonymous Handover Authentication Scheme in Mobile Networks.
Int. J. Netw. Secur., 2020
A lightweight verifiable outsourced decryption of attribute-based encryption scheme for blockchain-enabled wireless body area network in fog computing.
Int. J. Distributed Sens. Networks, 2020
Sci. China Inf. Sci., 2020
Sci. China Inf. Sci., 2020
Cloud-Assisted Privacy Protection for Data Retrieval Against Keyword Guessing Attacks.
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020
Dual Privacy-Preserving Health Data Aggregation Scheme Assisted by Medical Edge Computing.
Proceedings of the 9th IEEE/CIC International Conference on Communications in China, 2020
2019
Efficient and Robust Certificateless Signature for Data Crowdsensing in Cloud-Assisted Industrial IoT.
IEEE Trans. Ind. Informatics, 2019
A QR Code Secret Hiding Scheme against Contrast Analysis Attack for the Internet of Things.
Secur. Commun. Networks, 2019
Traceable Dynamic Public Auditing with Identity Privacy Preserving for Cloud Storage.
KSII Trans. Internet Inf. Syst., 2019
(Dual) server-aided revocable attribute-based encryption with decryption key exposure resistance.
Inf. Sci., 2019
Comments on "A Large-Scale Concurrent Data Anonymous Batch Verification Scheme for Mobile Healthcare Crowd Sensing".
IEEE Internet Things J., 2019
Int. J. Found. Comput. Sci., 2019
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2019
Construction of Resilient Boolean and Vectorial Boolean Functions with High Nonlinearity.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2019
Secure and flexible keyword search over encrypted data with outsourced decryption in Internet of things.
Ann. des Télécommunications, 2019
Ann. des Télécommunications, 2019
A Traceable Blockchain-Based Access Authentication System With Privacy Preservation in VANETs.
IEEE Access, 2019
Certificateless Multi-Party Authenticated Encryption for NB-IoT Terminals in 5G Networks.
IEEE Access, 2019
IEEE Access, 2019
Generic Approach to Outsource the Decryption of Attribute-Based Encryption in Cloud Computing.
IEEE Access, 2019
Flexible and Efficient Blockchain-Based ABE Scheme With Multi-Authority for Medical on Demand in Telemedicine System.
IEEE Access, 2019
IEEE Access, 2019
Proceedings of the 2019 IEEE/CIC International Conference on Communications in China, 2019
2018
Veh. Commun., 2018
Efficient and secure big data storage system with leakage resilience in cloud computing.
Soft Comput., 2018
Privacy-Preserving Data Aggregation against False Data Injection Attacks in Fog Computing.
Sensors, 2018
Hidden Policy Attribute-Based Data Sharing with Direct Revocation and Keyword Search in Cloud Computing.
Sensors, 2018
Secure Deduplication Based on Rabin Fingerprinting over Wireless Sensing Data in Cloud Computing.
Secur. Commun. Networks, 2018
Secur. Commun. Networks, 2018
SEIP: Secure and seamless IP communications for group-oriented machine to machine communications.
Peer-to-Peer Netw. Appl., 2018
灵活访问且模糊可搜索的EHR云服务系统 (Flexibly Accessed and Vaguely Searchable EHR Cloud Service System).
计算机科学, 2018
Privacy-preserving communication and power injection over vehicle networks and 5G smart grid slice.
J. Netw. Comput. Appl., 2018
Secure smart health with privacy-aware aggregate authentication and access control in Internet of Things.
J. Netw. Comput. Appl., 2018
J. Ambient Intell. Humaniz. Comput., 2018
Blockchain based efficient and robust fair payment for outsourcing services in cloud computing.
Inf. Sci., 2018
Security and Privacy in Smart Health: Efficient Policy-Hiding Attribute-Based Access Control.
IEEE Internet Things J., 2018
Discret. Appl. Math., 2018
Sci. China Inf. Sci., 2018
Fine-Grained Access Control Systems Suitable for Resource-Constrained Users in Cloud Computing.
Comput. Informatics, 2018
Efficient and Privacy-Preserving Medical Data Sharing in Internet of Things With Limited Computing Power.
IEEE Access, 2018
TKSE: Trustworthy Keyword Search Over Encrypted Data With Two-Side Verifiability via Blockchain.
IEEE Access, 2018
Secure Attribute-Based Signature Scheme With Multiple Authorities for Blockchain in Electronic Health Records Systems.
IEEE Access, 2018
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018
2017
1-Resilient Boolean Functions on Even Variables with Almost Perfect Algebraic Immunity.
Secur. Commun. Networks, 2017
Pers. Ubiquitous Comput., 2017
Efficient and Privacy-Aware Power Injection over AMI and Smart Grid Slice in Future 5G Networks.
Mob. Inf. Syst., 2017
改进的具有轻量级结构的Veron身份认证及数字签名方案 (Improved Veron's Identification with Lightweight Structure and Digital Signature Scheme).
计算机科学, 2017
Characterizing Linear Structures of Boolean Functions from Arithmetic Walsh Transform.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017
Achieving Secure and Seamless IP Communications for Group-Oriented Software Defined Vehicular Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017
PADA: Privacy-Aware Data Aggregation with Efficient Communication for Power Injection in 5G Smart Grid Slice.
Proceedings of the International Conference on Networking and Network Applications, 2017
Privacy-Preserving Medical Information Systems Using Multi-authority Content-Based Encryption in Cloud.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017
Anonymous Attribute-Based Encryption with Large Universe and Threshold Access Structures.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017
An Efficient and Secure Deduplication Scheme Based on Rabin Fingerprinting in Cloud Storage.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017
Server-Aided Revocable Attribute-Based Encryption Resilient to Decryption Key Exposure.
Proceedings of the Cryptology and Network Security - 16th International Conference, 2017
2016
Wirel. Commun. Mob. Comput., 2016
Online/offline unbounded multi-authority attribute-based encryption for data sharing in mobile cloud computing.
Secur. Commun. Networks, 2016
SPGS: a secure and privacy-preserving group setup framework for platoon-based vehicular cyber-physical systems.
Secur. Commun. Networks, 2016
Pervasive Mob. Comput., 2016
GLARM: Group-based lightweight authentication scheme for resource-constrained machine to machine communications.
Comput. Networks, 2016
Efficient and Expressive Anonymous Attribute-Based Encryption for Mobile Cloud Computing.
Proceedings of the Advances on Broad-Band Wireless Computing, 2016
Proceedings of the Advances on Broad-Band Wireless Computing, 2016
Accountable Large-Universe Attribute-Based Encryption Supporting Any Monotone Access Structures.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
2015
计算机科学, 2015
Toward secure large-scale machine-to-machine comm unications in 3GPP networks: chall enges and solutions.
IEEE Commun. Mag., 2015
SGSA: Secure Group Setup and Anonymous Authentication in Platoon-Based Vehicular Cyber-Physical Systems.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015
2014
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014
Computationally Efficient Ciphertext-Policy Attribute-Based Encryption with Constant-Size Ciphertexts.
Proceedings of the Provable Security - 8th International Conference, 2014
Proceedings of the IEEE International Conference on Information and Automation, 2014
2012
On the Equivalence between the Set Covering Problem and the Problem of Finding Optimal Cumulative Assignment Schemes.
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
2011
Proceedings of the IEEE 6th International Symposium on Service Oriented System Engineering, 2011
Proceedings of the Information Security Practice and Experience, 2011
2010
Anonymity Enhancement on Robust and Efficient Password-Authenticated Key Agreement Using Smart Cards.
IEEE Trans. Ind. Electron., 2010
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010
2009
IEEE Commun. Lett., 2009
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2009
2008
A Generic Construction for Instrusion-Resilient Signatures from Linear Feedback Shift Register.
J. Inf. Sci. Eng., 2008
IACR Cryptol. ePrint Arch., 2008
Proceedings of the Provable Security, Second International Conference, 2008
Proceedings of the Topics in Cryptology, 2008
2007
IACR Cryptol. ePrint Arch., 2007
IACR Cryptol. ePrint Arch., 2007
Proceedings of the Third International IEEE Conference on Signal-Image Technologies and Internet-Based System, 2007
Efficient Linkable Ring Signatures and Threshold Signatures from Linear Feedback Shift Register.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2007
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2007
Proceedings of the Cooperative Design, 2007
2006
IACR Cryptol. ePrint Arch., 2006
2005
Transitive Signatures Based on Bilinear Maps.
Proceedings of the Security in Information Systems, 2005
Proceedings of the Information Security, 8th International Conference, 2005
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005
Proceedings of the Discovery Science, 8th International Conference, 2005
Proceedings of the Progress in Pattern Recognition, 2005
2004
Yet another attack on a password authentication scheme based on quadratic residues with parameters unknown 1.
IACR Cryptol. ePrint Arch., 2004
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004
2002
Multiparty Authentication Services and Key Agreement Protocols with Semi-Trusted Third Party.
J. Comput. Sci. Technol., 2002