Guozhen Shi

Orcid: 0000-0003-4044-6210

According to our database1, Guozhen Shi authored at least 26 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
PriTKT: A Blockchain-Enhanced Privacy-Preserving Electronic Ticket System for IoT Devices.
Sensors, January, 2024

Double Issuer-Hiding Attribute-Based Credentials From Tag-Based Aggregatable Mercurial Signatures.
IEEE Trans. Dependable Secur. Comput., 2024

Block Cipher Algorithms Identification Scheme Based on KFDA.
Proceedings of the Advanced Intelligent Computing Technology and Applications, 2024

2023
An SSL-PUF Based Access Authentication and Key Distribution Scheme for the Space-Air-Ground Integrated Network.
Entropy, 2023

2021
Provenance-based data flow control mechanism for Internet of things.
Trans. Emerg. Telecommun. Technol., 2021

Research on Label Based Data Flow Control Mechanism.
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021

2020
CAMPS: Efficient and privacy-preserving medical primary diagnosis over outsourced cloud.
Inf. Sci., 2020

Incentive mechanism for cooperative authentication: An evolutionary game approach.
Inf. Sci., 2020

A topic-centric access control model for the publish/subscribe paradigm.
Concurr. Comput. Pract. Exp., 2020

Revocable Certificateless Public Key Encryption With Outsourced Semi-Trusted Cloud Revocation Agent.
IEEE Access, 2020

2019
Multi-Service Oriented Stream Data Synchronization Scheme for Multicore Cipher Chips.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2019

Research on a Hybrid System With Perfect Forward Secrecy.
CoRR, 2019

Privacy-Oriented Blockchain-Based Distributed Key Management Architecture for Hierarchical Access Control in the IoT Scenario.
IEEE Access, 2019

Pre-authorization Usage Control Mechanism for Cross-Domain in Cloud.
Proceedings of the Data Processing Techniques and Applications for Cyber-Physical Systems, 2019

Hierarchical Key Management Scheme with Multilevel Secure Access.
Proceedings of the 2019 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2019

Enhanced blockchain based key management scheme against key exposure attack.
Proceedings of the International Conference on Artificial Intelligence, 2019

2018
Design of Multi Cipher Processing Architecture for Random Cross Access.
Microprocess. Microsystems, 2018

An Efficient Stream Data Processing Model for Multiuser Cryptographic Service.
J. Electr. Comput. Eng., 2018

2017
SRAM: A State-Aware Risk Assessment Model for Intrusion Response.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017

Design and Implementation of the Components of the Symmetric Cryptographic Algorithm.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017

2016
Resource-centric Dynamic Access Control in Cloud.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

A Dual Threshold Secret Sharing Scheme among Weighted Participants of Special Right.
Proceedings of the IEEE First International Conference on Data Science in Cyberspace, 2016

2014
Research on Credible Regulation Mechanism for the Trading of Digital Works.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

A Reliable Supervision Model and Implementation for the Trading of Digital Works.
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014

A User-Based Document Management Mechanism in Cloud.
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014

2008
Redundant design of A CAN BUS Testing and Communication System for space robot arm.
Proceedings of the 10th International Conference on Control, 2008


  Loading...