Haifeng Li

Orcid: 0000-0002-4475-8310

Affiliations:
  • Dalian University of Technology, School of Software, China


According to our database1, Haifeng Li authored at least 14 papers between 2017 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
KASE-AKA: Key-aggregate keyword searchable encryption against keyword guessing attack and authorization abuse.
Comput. Stand. Interfaces, 2024

2023
An efficient and revocable attribute-based data sharing scheme with rich expression and escrow freedom.
Inf. Sci., May, 2023

2022
A survey of lattice based expressive attribute based encryption.
Comput. Sci. Rev., 2022

2021
Analysis of the Comments on "Identity-Based Distributed Provable Data Possession in Multicloud Storage".
IEEE Trans. Serv. Comput., 2021

Comments on "Attribute-Based Data Sharing Scheme Revisited in Cloud Computing".
IEEE Trans. Inf. Forensics Secur., 2021

PSCPAC: Post-quantum secure certificateless public auditing scheme in cloud storage.
J. Inf. Secur. Appl., 2021

The robust deep learning-based schemes for intrusion detection in Internet of Things environments.
Ann. des Télécommunications, 2021

2020
A Secure and Lightweight Fine-Grained Data Sharing Scheme for Mobile Cloud Computing.
Sensors, 2020

Lattice-Based Privacy-Preserving and Forward-Secure Cloud Storage Public Auditing Scheme.
IEEE Access, 2020

A Novel Approach for Associative Classification Based on Information Entropy of Frequent Attribute Set.
IEEE Access, 2020

2017
A Provable Private Data Aggregation Scheme Based on Digital Signatures and Homomorphic Encryption for Wireless Sensor Networks.
J. Inf. Hiding Multim. Signal Process., 2017

A Multi-keyword Search Algorithm Based on Polynomial Function and Safety Inner-product Method in Secure Cloud Environment.
J. Inf. Hiding Multim. Signal Process., 2017

Mixed Symmetric Key and Elliptic Curve Encryption Scheme Used for Password Authentication and Update Under Unstable Network Environment.
J. Inf. Hiding Multim. Signal Process., 2017

A New Security Cloud Storage Data Encryption Scheme Based on Identity Proxy Re-encryption.
Int. J. Netw. Secur., 2017


  Loading...