Haibo Tian
According to our database1,
Haibo Tian
authored at least 78 papers
between 2005 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Lattice based distributed threshold additive homomorphic encryption with application in federated learning.
Comput. Stand. Interfaces, January, 2024
Proceedings of the Data Security and Privacy Protection - Second International Conference, 2024
2023
IACR Cryptol. ePrint Arch., 2023
Proceedings of the Information Security and Cryptology - 19th International Conference, 2023
Post-quantum Dropout-Resilient Aggregation for Federated Learning via Lattice-Based PRF.
Proceedings of the Artificial Intelligence Security and Privacy, 2023
2022
Sci. China Inf. Sci., 2022
Proceedings of the Security and Privacy in Social Networks and Big Data, 2022
Searching for Encrypted Data on Blockchain: An Efficient, Secure and Fair Realization.
Proceedings of the Information Security - 25th International Conference, 2022
Proceedings of the Cyberspace Safety and Security - 14th International Symposium, 2022
A Distributed Threshold Additive Homomorphic Encryption for Federated Learning with Dropout Resiliency Based on Lattice.
Proceedings of the Cyberspace Safety and Security - 14th International Symposium, 2022
2021
Peer-to-Peer Netw. Appl., 2021
Secure Linear Aggregation Using Decentralized Threshold Additive Homomorphic Encryption For Federated Learning.
CoRR, 2021
2020
Inf. Sci., 2020
Blockchain-Enabled Computing Resource Trading: A Deep Reinforcement Learning Approach.
Proceedings of the 2020 IEEE Wireless Communications and Networking Conference, 2020
Proceedings of the Frontiers in Cyber Security - Third International Conference, 2020
Proceedings of the Computer Security - ESORICS 2020, 2020
2019
Soft Comput., 2019
KSII Trans. Internet Inf. Syst., 2019
Proceedings of the Provable Security, 2019
Proceedings of the Parallel Architectures, Algorithms and Programming, 2019
Proceedings of the 2019 IEEE Globecom Workshops, Waikoloa, HI, USA, December 9-13, 2019, 2019
Proceedings of the Information Security and Cryptology - 15th International Conference, 2019
Proceedings of the Blockchain and Trustworthy Systems - First International Conference, 2019
2018
AFCoin: A Framework for Digital Fiat Currency of Central Banks Based on Account Model.
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018
2017
Int. J. Embed. Syst., 2017
Proceedings of the Information Security Practice and Experience, 2017
Proceedings of the Geo-Spatial Knowledge and Intelligence - 5th International Conference, 2017
Proceedings of the Information Security and Cryptology - 13th International Conference, 2017
2016
Secure Modular Exponentiation Outsource With Two Untrusted Programs and Improved Checkability.
J. Inf. Sci. Eng., 2016
2015
Int. J. High Perform. Comput. Netw., 2015
Proceedings of the 10th ACM Symposium on Information, 2015
2014
J. Supercomput., 2014
Inf. Sci., 2014
Int. J. Grid Util. Comput., 2014
Frontiers Comput. Sci., 2014
Proceedings of the Network and System Security - 8th International Conference, 2014
2013
A non-delegatable strong designated verifier signature in ID-based setting for mobile environment.
Math. Comput. Model., 2013
Int. J. Netw. Secur., 2013
A systematic method to design strong designated verifier signature without random oracles.
Clust. Comput., 2013
Selectively unforgeable but existentially forgeable signature schemes and applications.
Sci. China Inf. Sci., 2013
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
2012
Int. J. Grid Util. Comput., 2012
IET Inf. Secur., 2012
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012
Deniably Information-Hiding Encryptions Secure against Adaptive Chosen Ciphertext Attack.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012
An Efficient Identity-Based Strong Designated Verifier Signature without Delegatability.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012
Proceedings of the Information Security and Privacy - 17th Australasian Conference, 2012
2011
Theor. Comput. Sci., 2011
Comput. Electr. Eng., 2011
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011
Proceedings of the Information Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea, November 30, 2011
Proceedings of the Information Security and Cryptology - 7th International Conference, 2011
2010
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010
Proceedings of the Information Security and Cryptology - 6th International Conference, 2010
Proceedings of the Information Security and Privacy - 15th Australasian Conference, 2010
2009
Key-Exposure Free Chameleon Hashing and Signatures Based on Discrete Logarithm Systems.
IACR Cryptol. ePrint Arch., 2009
IACR Cryptol. ePrint Arch., 2009
Comments and Improvements on Chameleon Hashing Without Key Exposure Based on Factoring.
IACR Cryptol. ePrint Arch., 2009
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
2008
A Provable Secure ID-Based Explicit Authenticated Key Agreement Protocol Without Random Oracles.
J. Comput. Sci. Technol., 2008
Inf. Sci., 2008
2007
2006
Security Analysis of the Digital Transmission Copy Protection Specification.
Proceedings of the 2006 International Conference on Security & Management, 2006
2005
IEEE Trans. Consumer Electron., 2005
Proceedings of the Computational Intelligence and Security, International Conference, 2005