Futai Zhang
Orcid: 0000-0001-8984-1030
According to our database1,
Futai Zhang
authored at least 78 papers
between 2000 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
Comput. Stand. Interfaces, 2025
2024
An Efficient Aggregate Signature Scheme With Designated Verifier Based on the Schnorr Signature in Healthcare Wireless Sensor Networks.
IEEE Internet Things J., October, 2024
Efficient Identity-Based Dynamic Cloud Storage Data Integrity Auditing with Incremental Updates for Handheld Mobile Devices.
Proceedings of the Data Security and Privacy Protection - Second International Conference, 2024
2022
Secure Data Delivery With Identity-Based Linearly Homomorphic Network Coding Signature Scheme in IoT.
IEEE Trans. Serv. Comput., 2022
IEEE Trans. Serv. Comput., 2022
IEEE Internet Things J., 2022
An Efficient Certificate-Based Data Integrity Auditing Protocol for Cloud-Assisted WBANs.
IEEE Internet Things J., 2022
Comput. J., 2022
Structure-Preserving Linearly Homomorphic Signature with Designated Combiner for Subspace.
Proceedings of the Information Security and Privacy - 27th Australasian Conference, 2022
2021
IEEE Trans. Dependable Secur. Comput., 2021
Lightweight certificateless linearly homomorphic network coding signature scheme for electronic health system.
IET Inf. Secur., 2021
2020
Theor. Comput. Sci., 2020
Inf. Sci., 2020
Int. J. Found. Comput. Sci., 2020
Comput. J., 2020
2019
Wirel. Pers. Commun., 2019
J. Comput. Sci. Technol., 2019
Int. J. Inf. Sec., 2019
2018
Theor. Comput. Sci., 2018
CCA-Secure Revocable Identity-Based Encryption With Ciphertext Evolution in the Cloud.
IEEE Access, 2018
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018
2017
Int. J. Embed. Syst., 2017
New Certificateless Public Key Encryption Secure Against Malicious KGC Attacks in the Standard Model.
Proceedings of the Information and Communications Security - 19th International Conference, 2017
2016
Inf. Sci., 2016
Proceedings of the Provable Security, 2016
2015
IET Inf. Secur., 2015
Information-theoretical secure verifiable secret sharing with vector space access structures over bilinear groups and its applications.
Future Gener. Comput. Syst., 2015
2014
Efficient certificateless encryption withstanding attacks from malicious KGC without using random oracles.
Secur. Commun. Networks, 2014
Inf. Sci., 2014
Cryptanalysis and improvement on a certificateless encryption scheme in the standard model.
Int. J. Inf. Comput. Secur., 2014
Comput. J., 2014
Information-Theoretical Secure Verifiable Secret Sharing with Vector Space Access Structures over Bilinear Groups.
Proceedings of the Information Security Practice and Experience, 2014
Proceedings of the Information Security Practice and Experience, 2014
2013
Int. J. Grid Util. Comput., 2013
Corrigendum: "Provably-secure electronic cash based on certicateless partially-blind signatures".
Electron. Commer. Res. Appl., 2013
Clust. Comput., 2013
Secure Distributed Key Generation on Vector Space Access Structures in Bilinear Groups.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
2012
Proceedings of the Network and System Security - 6th International Conference, 2012
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012
2011
Electron. Commer. Res. Appl., 2011
2010
Inf. Sci., 2010
Int. J. Comput. Commun. Control, 2010
Comput. Networks, 2010
2009
IEEE Trans. Dependable Secur. Comput., 2009
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009
Provably Secure Certificateless Two-Party Authenticated Key Agreement Protocol without Pairing.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009
Proceedings of the Applied Algebra, 2009
2008
Int. J. Netw. Secur., 2008
IACR Cryptol. ePrint Arch., 2008
Proceedings of IEEE International Conference on Communications, 2008
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008
2007
J. Comput. Sci. Technol., 2007
Proceedings of the Provable Security, 2007
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2007
Proceedings of the Cryptology and Network Security, 6th International Conference, 2007
2006
Proceedings of the Ubiquitous Intelligence and Computing, Third International Conference, 2006
Proceedings of the Information Security Practice and Experience, 2006
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006
2005
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005
Proceedings of the Cryptology and Network Security, 4th International Conference, 2005
Identity-Based Ring Signcryption Schemes: Cryptographic Primitives for Preserving Privacy and Authenticity in the Ubiquitous World.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005
2002
J. Comput. Sci. Technol., 2002
2001
Proceedings of the Information and Communications Security, Third International Conference, 2001
2000
Fair Electronic Cash Systems with Multiple Banks.
Proceedings of the Information Security for Global Information Infrastructures, 2000