Hanshu Hong
Orcid: 0000-0002-4316-0210
According to our database1,
Hanshu Hong
authored at least 23 papers
between 2016 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
A designated private set based trapdoor authentication scheme for privacy preserving trust management in decentralized systems.
Discov. Comput., December, 2024
2023
Constructing conditional PKEET with verification mechanism for data privacy protection in intelligent systems.
J. Supercomput., September, 2023
2022
TS-ABOS-CMS: time-bounded secure attribute-based online/offline signature with constant message size for IoT systems.
J. Syst. Archit., 2022
2021
Peer-to-Peer Netw. Appl., 2021
A Fine-Grained Attribute Based Data Retrieval with Proxy Re-Encryption Scheme for Data Outsourcing Systems.
Mob. Networks Appl., 2021
J. Syst. Archit., 2021
Trans. Emerg. Telecommun. Technol., 2021
Proceedings of the NAI'21: Proceedings of the ACM SIGCOMM 2021 Workshop on Network-Application Integration, 2021
2020
UAV-aided networks with optimization allocation via artificial bee colony with intellective search.
EURASIP J. Wirel. Commun. Netw., 2020
2019
Toward secure and accountable data transmission in Narrow Band Internet of Things based on blockchain.
Int. J. Distributed Sens. Networks, 2019
A Ciphertext Policy Attribute Based Signcryption Scheme with Secure and Flexible Key Evolving.
Proceedings of the 2019 IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2019
2018
Sharing your privileges securely: a key-insulated attribute based proxy re-encryption scheme for IoT.
World Wide Web, 2018
Achieving secure data access control and efficient key updating in mobile multimedia sensor networks.
Multim. Tools Appl., 2018
A Coordinated Ciphertext Policy Attribute-based PHR Access Control with User Accountability.
KSII Trans. Internet Inf. Syst., 2018
IEEE Access, 2018
2017
Wirel. Pers. Commun., 2017
Towards Secure Data Retrieval for Multi-Tenant Architecture Using Attribute-Based Key Word Search.
Symmetry, 2017
A Secure and Efficient Cloud Resource Allocation Scheme with Trust Evaluation Mechanism Based on Combinatorial Double Auction.
KSII Trans. Internet Inf. Syst., 2017
Provably secure attribute based signcryption with delegated computation and efficient key updating.
KSII Trans. Internet Inf. Syst., 2017
Efficient key insulated attribute based signature without bilinear pairings for mobile communications.
Autom. Control. Comput. Sci., 2017
A Collaborative Key Management Protocol in Ciphertext Policy Attribute-Based Encryption for Cloud Data Sharing.
IEEE Access, 2017
2016
An efficient and traceable KP-ABS scheme with untrusted attribute authority in cloud computing.
J. Cloud Comput., 2016
A key-insulated CP-ABE with key exposure accountability for secure data sharing in the cloud.
KSII Trans. Internet Inf. Syst., 2016