Hong Zhong
Orcid: 0000-0002-0392-9734Affiliations:
- Anhui University, School of Computer Science and Technology, Hefei, China
According to our database1,
Hong Zhong
authored at least 241 papers
between 2005 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
A Threshold-Based Full-Decentralized Authentication and Key Agreement Scheme for VANETs Powered by Consortium Blockchain.
IEEE Trans. Mob. Comput., December, 2024
IEEE Trans. Mob. Comput., December, 2024
LH-IDS: Lightweight Hybrid Intrusion Detection System Based on Differential Privacy in VANETs.
IEEE Trans. Mob. Comput., December, 2024
Auto-Updating Intrusion Detection System for Vehicular Network: A Deep Learning Approach Based on Cloud-Edge-Vehicle Collaboration.
IEEE Trans. Veh. Technol., October, 2024
MM-SDVN: Efficient Mobility Management Scheme for Optimal Network Handover in Software-Defined Vehicular Network.
IEEE Internet Things J., October, 2024
IEEE Trans. Intell. Transp. Syst., August, 2024
Revocable and Efficient Blockchain-Based Fine-Grained Access Control Against EDoS Attacks in Cloud Storage.
IEEE Trans. Computers, August, 2024
CBDDS: Secure and Revocable Cache-Based Distributed Data Sharing for Vehicular Networks.
IEEE Trans. Mob. Comput., June, 2024
Enabling Efficient, Verifiable, and Secure Conjunctive Keyword Search in Hybrid-Storage Blockchains.
IEEE Trans. Knowl. Data Eng., June, 2024
A Decentralized Authenticated Key Agreement Scheme Based on Smart Contract for Securing Vehicular Ad-Hoc Networks.
IEEE Trans. Mob. Comput., May, 2024
Efficient Blockchain-Based Mutual Authentication and Session Key Agreement for Cross-Domain IIoT.
IEEE Internet Things J., May, 2024
Lightweight and Secure Data Sharing Based on Proxy Re-Encryption for Blockchain-Enabled Industrial Internet of Things.
IEEE Internet Things J., April, 2024
ACM Trans. Sens. Networks, March, 2024
DBCPA: Dual Blockchain-Assisted Conditional Privacy-Preserving Authentication Framework and Protocol for Vehicular Ad Hoc Networks.
IEEE Trans. Mob. Comput., February, 2024
CVAR: Distributed and Extensible Cross-Region Vehicle Authentication With Reputation for VANETs.
IEEE Trans. Intell. Transp. Syst., January, 2024
IEEE Trans. Intell. Transp. Syst., January, 2024
Veh. Commun., 2024
Toward Open-Set Intrusion Detection in VANETs: An Efficient Meta-Recognition Approach.
IEEE Trans. Netw. Sci. Eng., 2024
A Practical and Provably Secure Authentication and Key Agreement Scheme for UAV-Assisted VANETs for Emergency Rescue.
IEEE Trans. Netw. Sci. Eng., 2024
LISP-MM: Efficient LISP-Based Mobility Management in Software Defined Vehicular Networks.
IEEE Trans. Netw. Sci. Eng., 2024
Device-Side Lightweight Mutual Authentication and Key Agreement Scheme Based on Chameleon Hashing for Industrial Internet of Things.
IEEE Trans. Inf. Forensics Secur., 2024
Secure and Efficient User-Centric V2C Communication for Intelligent Cyber-Physical Transportation System.
IEEE Trans. Inf. Forensics Secur., 2024
Blockchain-Based Secure Cross-Domain Data Sharing for Edge-Assisted Industrial Internet of Things.
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Dependable Secur. Comput., 2024
Blockchain-Based Lightweight Message Authentication for Edge-Assisted Cross-Domain Industrial Internet of Things.
IEEE Trans. Dependable Secur. Comput., 2024
DSChain: A Blockchain System for Complete Lifecycle Security of Data in Internet of Things.
IEEE Trans. Dependable Secur. Comput., 2024
2023
Efficient Blockchain-Based Data Integrity Auditing for Multi-Copy in Decentralized Storage.
IEEE Trans. Parallel Distributed Syst., December, 2023
L-TCM: A Lightweight Privacy-Preserving Traffic Condition Monitoring Scheme With Source Authentication in Cloud-Assisted VANETs.
IEEE Syst. J., December, 2023
SecuCar: Data Loss Prevention for Cloud Assisted VSS Based on Public Auditing Technique.
IEEE Trans. Veh. Technol., November, 2023
Lightweight Encryption and Authentication for Controller Area Network of Autonomous Vehicles.
IEEE Trans. Veh. Technol., November, 2023
AC-SDVN: An Access Control Protocol for Video Multicast in Software Defined Vehicular Networks.
IEEE Trans. Mob. Comput., October, 2023
LPPA-RCM: A lightweight privacy-preserving authentication scheme for road condition monitoring in fog-based VANETs.
J. Syst. Archit., October, 2023
Inf. Sci., October, 2023
Collaborative Intrusion Detection System for SDVN: A Fairness Federated Deep Learning Approach.
IEEE Trans. Parallel Distributed Syst., September, 2023
Blockchain-Assisted Privacy-Preserving Traffic Route Management Scheme for Fog-Based Vehicular Ad-Hoc Networks.
IEEE Trans. Netw. Serv. Manag., September, 2023
IEEE Trans. Knowl. Data Eng., September, 2023
Efficient Integrity Auditing Mechanism With Secure Deduplication for Blockchain Storage.
IEEE Trans. Computers, August, 2023
Expert Syst. Appl., August, 2023
J. Netw. Comput. Appl., June, 2023
IEEE Trans. Knowl. Data Eng., May, 2023
Conditional privacy-preserving message authentication scheme for cross-domain Industrial Internet of Things.
Ad Hoc Networks, May, 2023
IEEE Trans. Netw. Serv. Manag., March, 2023
Chaotic Map-Based Authentication Scheme Using Physical Unclonable Function for Internet of Autonomous Vehicle.
IEEE Trans. Intell. Transp. Syst., March, 2023
J. Sens. Actuator Networks, February, 2023
Towards Fully Anonymous Integrity Checking and Reliability Authentication for Cloud Data Sharing.
IEEE Trans. Serv. Comput., 2023
IEEE Trans. Netw. Sci. Eng., 2023
Secure Edge Computing-Assisted Video Reporting Service in 5G-Enabled Vehicular Networks.
IEEE Trans. Inf. Forensics Secur., 2023
Efficient Anonymous Authentication Based on Physically Unclonable Function in Industrial Internet of Things.
IEEE Trans. Inf. Forensics Secur., 2023
IEEE Trans. Inf. Forensics Secur., 2023
A Lightweight and Conditional Privacy-Preserving Authenticated Key Agreement Scheme With Multi-TA Model for Fog-Based VANETs.
IEEE Trans. Dependable Secur. Comput., 2023
Achieving Revocable Attribute Group-Based Encryption for Mobile Cloud Data: A Multi-Proxy Assisted Approach.
IEEE Trans. Dependable Secur. Comput., 2023
An Efficient Integrity Checking Scheme With Full Identity Anonymity for Cloud Data Sharing.
IEEE Trans. Cloud Comput., 2023
Multi-factor based session secret key agreement for the Industrial Internet of Things.
Ad Hoc Networks, 2023
Proceedings of the 22nd IEEE International Conference on Trust, 2023
Proceedings of the 22nd IEEE International Conference on Trust, 2023
Reversible Data Hiding in Encrypted Images Based on Block Classification Coding of Sparse Representation.
Proceedings of the Provable and Practical Security, 2023
Proceedings of the International Conference on Networking and Network Applications, 2023
SLCSA: Scalable Layered Cooperative Service Attestation Scheme in Cloud-Edge-End Cooperation Environments.
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023
Authenticated Ranked Keyword Search over Encrypted Data with Strong Privacy Guarantee.
Proceedings of the Database Systems for Advanced Applications, 2023
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2023
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
2022
MOE/RF: A Novel Phishing Detection Model Based on Revised Multiobjective Evolution Optimization Algorithm and Random Forest.
IEEE Trans. Netw. Serv. Manag., December, 2022
IEEE Trans. Veh. Technol., 2022
LBVP: A Lightweight Batch Verification Protocol for Fog-Based Vehicular Networks Using Self-Certified Public Key Cryptography.
IEEE Trans. Veh. Technol., 2022
A Practical and Efficient Bidirectional Access Control Scheme for Cloud-Edge Data Sharing.
IEEE Trans. Parallel Distributed Syst., 2022
Toward Data Transmission Security Based on Proxy Broadcast Re-encryption in Edge Collaboration.
ACM Trans. Sens. Networks, 2022
Proven Secure Tree-Based Authenticated Key Agreement for Securing V2V and V2I Communications in VANETs.
IEEE Trans. Mob. Comput., 2022
IEEE Trans. Intell. Transp. Syst., 2022
IEEE Trans. Intell. Transp. Syst., 2022
Parallel Key-Insulated Multiuser Searchable Encryption for Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2022
CBACS: A Privacy-Preserving and Efficient Cache-Based Access Control Scheme for Software Defined Vehicular Networks.
IEEE Trans. Inf. Forensics Secur., 2022
IEEE Trans. Cloud Comput., 2022
Personalized Location Privacy Protection Based on Vehicle Movement Regularity in Vehicular Networks.
IEEE Syst. J., 2022
An Anonymous and Outsourcing-Supported Multiauthority Access Control Scheme With Revocation for Edge-Enabled IIoT System.
IEEE Syst. J., 2022
Secure and Lightweight Conditional Privacy-Preserving Authentication for Fog-Based Vehicular Ad Hoc Networks.
IEEE Internet Things J., 2022
IEEE Internet Things J., 2022
PersonalityGate: A general plug-and-play GNN gate to enhance cascade prediction with personality recognition task.
Expert Syst. Appl., 2022
Comput. Networks, 2022
Forward and backward secure searchable encryption with multi-keyword search and result verification.
Sci. China Inf. Sci., 2022
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022
2021
Intelligent Drone-assisted Anonymous Authentication and Key Agreement for 5G/B5G Vehicular Ad-Hoc Networks.
IEEE Trans. Netw. Sci. Eng., 2021
IEEE Trans. Multim., 2021
SMAKA: Secure Many-to-Many Authentication and Key Agreement Scheme for Vehicular Networks.
IEEE Trans. Inf. Forensics Secur., 2021
Secure and Lightweight Conditional Privacy-Preserving Authentication for Securing Traffic Emergency Messages in VANETs.
IEEE Trans. Inf. Forensics Secur., 2021
IEEE Trans. Ind. Electron., 2021
PA-CRT: Chinese Remainder Theorem Based Conditional Privacy-Preserving Authentication Scheme in Vehicular Ad-Hoc Networks.
IEEE Trans. Dependable Secur. Comput., 2021
IEEE Trans. Big Data, 2021
IEEE Syst. J., 2021
IEEE Internet Things J., 2021
AC4AV: A Flexible and Dynamic Access Control Framework for Connected and Autonomous Vehicles.
IEEE Internet Things J., 2021
Toward Achieving Fine-Grained Access Control of Data in Connected and Autonomous Vehicles.
IEEE Internet Things J., 2021
Leveraging Semisupervised Hierarchical Stacking Temporal Convolutional Network for Anomaly Detection in IoT Communication.
IEEE Internet Things J., 2021
Utility-efficient differentially private K-means clustering based on cluster merging.
Neurocomputing, 2021
An efficient and outsourcing-supported attribute-based access control scheme for edge-enabled smart healthcare.
Future Gener. Comput. Syst., 2021
IBEET-AOK: ID-based encryption with equality test against off-line KGAs for cloud medical services.
Frontiers Comput. Sci., 2021
Differentially private user-based collaborative filtering recommendation based on k-means clustering.
Expert Syst. Appl., 2021
PersonalityGate: A General Plug-and-Play GNN Gate to Enhance Cascade Prediction with Personality Recognition Task.
CoRR, 2021
CoRR, 2021
On the differential privacy of dynamic location obfuscation with personalized error bounds.
CoRR, 2021
Fair auctioning and trading framework for cloud virtual machines based on blockchain.
Comput. Commun., 2021
Comput. Networks, 2021
Comput. Networks, 2021
Differentially Private Double Auction with Reliability-Aware in Mobile Crowd Sensing.
Ad Hoc Networks, 2021
Proceedings of the IEEE Symposium on Computers and Communications, 2021
Proceedings of the 2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, 2021
Proceedings of the 31st Data Compression Conference, 2021
Secure and Efficient Certificateless Provable Data Possession for Cloud-Based Data Management Systems.
Proceedings of the Database Systems for Advanced Applications, 2021
2020
Veh. Commun., 2020
Edge Computing-Based Privacy-Preserving Authentication Framework and Protocol for 5G-Enabled Vehicular Networks.
IEEE Trans. Veh. Technol., 2020
IEEE Trans. Veh. Technol., 2020
Extensible Conditional Privacy Protection Authentication Scheme for Secure Vehicular Networks in a Multi-Cloud Environment.
IEEE Trans. Inf. Forensics Secur., 2020
Enhanced Security Identity-Based Privacy-Preserving Authentication Scheme Supporting Revocation for VANETs.
IEEE Syst. J., 2020
IEEE Syst. J., 2020
Edge Computing in VANETs-An Efficient and Privacy-Preserving Cooperative Downloading Scheme.
IEEE J. Sel. Areas Commun., 2020
J. Netw. Comput. Appl., 2020
A weight-based conditional privacy-preserving authentication scheme in software-defined vehicular network.
J. Cloud Comput., 2020
J. Cloud Comput., 2020
Inf. Sci., 2020
An Extensible and Effective Anonymous Batch Authentication Scheme for Smart Vehicular Networks.
IEEE Internet Things J., 2020
DCDChain: A Credible Architecture of Digital Copyright Detection Based on Blockchain.
CoRR, 2020
A Differentially Private Framework in Spatial Crowdsourcing with Historical Data Learning.
CoRR, 2020
CoRR, 2020
LBBESA: An efficient software-defined networking load-balancing scheme based on elevator scheduling algorithm.
Concurr. Comput. Pract. Exp., 2020
Sci. China Inf. Sci., 2020
LPE-RCM: Lightweight Privacy-Preserving Edge-Based Road Condition Monitoring for VANETs.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2020
Proceedings of the 13th IEEE/ACM International Conference on Utility and Cloud Computing, 2020
Proceedings of the Security and Privacy in Communication Networks, 2020
Proceedings of the 22nd IEEE International Conference on High Performance Computing and Communications; 18th IEEE International Conference on Smart City; 6th IEEE International Conference on Data Science and Systems, 2020
2019
Wireless Networks, Springer, ISBN: 978-3-030-01149-9, 2019
Wirel. Networks, 2019
IEEE Trans. Veh. Technol., 2019
An Efficient Message-Authentication Scheme Based on Edge Computing for Vehicular Ad Hoc Networks.
IEEE Trans. Intell. Transp. Syst., 2019
Differentially Private Double Spectrum Auction With Approximate Social Welfare Maximization.
IEEE Trans. Inf. Forensics Secur., 2019
SCPLBS: a smart cooperative platform for load balancing and security on SDN distributed controllers.
Peer-to-Peer Netw. Appl., 2019
Knowl. Based Syst., 2019
Inf. Sci., 2019
OOABKS: Online/offline attribute-based encryption for keyword search in mobile cloud.
Inf. Sci., 2019
Lightweight Privacy-Preserving Identity-Based Verifiable IoT-Based Health Storage System.
IEEE Internet Things J., 2019
RSMA: Reputation System-Based Lightweight Message Authentication Framework and Protocol for 5G-Enabled Vehicular Networks.
IEEE Internet Things J., 2019
Future Gener. Comput. Syst., 2019
EURASIP J. Wirel. Commun. Netw., 2019
Privacy-preserving Double Auction Mechanism Based on Homomorphic Encryption and Sorting Networks.
CoRR, 2019
Differentially Private Aggregated Mobility Data Publication Using Moving Characteristics.
CoRR, 2019
A New Message Authentication Scheme for Multiple Devices in Intelligent Connected Vehicles Based on Edge Computing.
IEEE Access, 2019
IEEE Access, 2019
HS-TCN: A Semi-supervised Hierarchical Stacking Temporal Convolutional Network for Anomaly Detection in IoT.
Proceedings of the 38th IEEE International Performance Computing and Communications Conference, 2019
Proceedings of the 25th IEEE International Conference on Parallel and Distributed Systems, 2019
Proceedings of the 2019 IEEE International Conference on Communications, 2019
RTEF-PP: A Robust Trust Evaluation Framework with Privacy Protection for Cloud Services Providers.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2019
Acoustic Scene Classification Using Deep Convolutional Neural Network via Transfer Learning.
Proceedings of the International Conference on Asian Language Processing, 2019
2018
HCPA-GKA: A hash function-based conditional privacy-preserving authentication and group-key agreement scheme for VANETs.
Veh. Commun., 2018
IEEE Trans. Parallel Distributed Syst., 2018
IEEE Trans. Netw. Serv. Manag., 2018
Multi-authority attribute-based encryption access control scheme with policy hidden for cloud storage.
Soft Comput., 2018
Sensors, 2018
Data aggregation with end-to-end confidentiality and integrity for large-scale wireless sensor networks.
Peer-to-Peer Netw. Appl., 2018
An efficient and secure recoverable data aggregation scheme for heterogeneous wireless sensor networks.
J. Parallel Distributed Comput., 2018
Inf. Sci., 2018
An efficient certificateless aggregate signature without pairings for vehicular ad hoc networks.
Inf. Sci., 2018
Distributed Collaborative Execution on the Edges and Its Application to AMBER Alerts.
IEEE Internet Things J., 2018
Efficient Privacy-Preserving Scheme for Real-Time Location Data in Vehicular Ad-Hoc Network.
IEEE Internet Things J., 2018
Fundam. Informaticae, 2018
Reprint of "LBBSRT: An efficient SDN load balancing scheme based on server response time".
Future Gener. Comput. Syst., 2018
CoRR, 2018
Conditional Privacy-Preserving Authentication Using Registration List in Vehicular Ad Hoc Networks.
IEEE Access, 2018
Proceedings of the Information and Communications Security - 20th International Conference, 2018
Proceedings of the 38th IEEE International Conference on Distributed Computing Systems, 2018
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018
Efficient Conditional Privacy-Preserving Authentication Scheme Using Revocation Messages for VANET.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018
SMCLBRT: A Novel Load-Balancing Strategy of Multiple SDN Controllers Based on Response Time.
Proceedings of the 20th IEEE International Conference on High Performance Computing and Communications; 16th IEEE International Conference on Smart City; 4th IEEE International Conference on Data Science and Systems, 2018
How Edge Computing and Initial Congestion Window Affect Latency of Web-Based Services: Early Experiences with Baidu?
Proceedings of the 2018 IEEE/ACM Symposium on Edge Computing, 2018
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018
TDDAD: Time-Based Detection and Defense Scheme Against DDoS Attack on SDN Controller.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018
2017
SPACF: A Secure Privacy-Preserving Authentication Scheme for VANET With Cuckoo Filter.
IEEE Trans. Veh. Technol., 2017
Public Auditing with Privacy Protection in a Multi-User Model of Cloud-Assisted Body Sensor Networks.
Sensors, 2017
LEPA: A Lightweight and Efficient Public Auditing Scheme for Cloud-Assisted Wireless Body Sensor Networks.
Secur. Commun. Networks, 2017
Privacy-preserving point-inclusion protocol for an arbitrary area based on phase-encoded quantum private query.
Quantum Inf. Process., 2017
Quantum Inf. Process., 2017
Int. J. Netw. Secur., 2017
Future Gener. Comput. Syst., 2017
Concurr. Comput. Pract. Exp., 2017
Area-based mobile multicast group key management scheme for secure mobile cooperative sensing.
Sci. China Inf. Sci., 2017
IEEE Access, 2017
IEEE Access, 2017
Proceedings of the 25th IEEE/ACM International Symposium on Quality of Service, 2017
A Privacy Protection Scheme for Vehicle's Location Based on Virtual Location and Route Confusion.
Proceedings of the 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2017
Proceedings of the Second ACM/IEEE Symposium on Edge Computing, San Jose / Silicon Valley, 2017
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2017
2016
Efficient extensible conditional privacy-preserving authentication scheme supporting batch verification for VANETs.
Secur. Commun. Networks, 2016
Quantum Inf. Process., 2016
基于组合阶双线性群的组签名方案的分析与改进 (Correctness Analysis and Improvement of Group Signature in Composite Order Bilinear Groups).
计算机科学, 2016
基于编码和同态加密的高效SMP方案 (Efficient Solution to SMP Based on Coding and Homomorphic Encryption).
计算机科学, 2016
基于中国剩余定理的群签名改进方案 (Improved Group Signature Scheme Based on Chinese Remainder Theorem).
计算机科学, 2016
J. Inf. Hiding Multim. Signal Process., 2016
A Novel Fragile Watermark-Based Image Authentication Scheme for AMBTC-Compressed Images.
J. Inf. Hiding Multim. Signal Process., 2016
An Efficient Electronic English Auction System with a Secure On-Shelf Mechanism and Privacy Preserving.
J. Electr. Comput. Eng., 2016
KSII Trans. Internet Inf. Syst., 2016
Quantum private set intersection cardinality and its application to anonymous authentication.
Inf. Sci., 2016
Int. J. Secur. Networks, 2016
Int. J. Netw. Secur., 2016
ECPB: Efficient Conditional Privacy-Preserving Authentication Scheme Supporting Batch Verification for VANETs.
Int. J. Netw. Secur., 2016
Proceedings of the 9th International Conference on Utility and Cloud Computing, 2016
A fined-grained privacy-preserving access control protocol in wireless sensor networks.
Proceedings of the 9th International Conference on Utility and Cloud Computing, 2016
Proceedings of the 35th IEEE Symposium on Reliable Distributed Systems, 2016
A Lightweight and Secure Data Authentication Scheme with Privacy Preservation for Wireless Sensor Networks.
Proceedings of the International Conference on Networking and Network Applications, 2016
Proceedings of the 17th ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2016
Proceedings of the Fourth IEEE Workshop on Hot Topics in Web Systems and Technologies, 2016
Proceedings of the Seventh International Green and Sustainable Computing Conference, 2016
Proceedings of the IEEE/ACM Symposium on Edge Computing, 2016
Proceedings of the International Conference on Advanced Cloud and Big Data, 2016
2015
Comments on two schemes of identity-based user authentication and key agreement for mobile client-server networks.
J. Supercomput., 2015
Secur. Commun. Networks, 2015
An Efficient SDN Load Balancing Scheme Based on Variance Analysis for Massive Mobile Users.
Mob. Inf. Syst., 2015
J. Inf. Hiding Multim. Signal Process., 2015
Int. J. Electron. Secur. Digit. Forensics, 2015
2014
Trans. Emerg. Telecommun. Technol., 2014
Proceedings of the 10th International Conference on Natural Computation, 2014
2013
Erratum to: Multi-party quantum key agreement with Bell states and Bell measurements.
Quantum Inf. Process., 2013
Quantum Inf. Process., 2013
2012
Quantum Inf. Process., 2012
Proceedings of the Eighth International Conference on Natural Computation, 2012
Proceedings of the 9th International Conference on Fuzzy Systems and Knowledge Discovery, 2012
2011
Quantum Inf. Process., 2011
Quantum Inf. Process., 2011
An Efficient Multiparty Quantum Secret Sharing with Pure Entangled Two Photon States.
Proceedings of the Advances in Computer Science, Environment, Ecoinformatics, and Education, 2011
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011
2010
Proceedings of the International Conference on E-Business and E-Government, 2010
2008
Proceedings of the International Workshop on Knowledge Discovery and Data Mining, 2008
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2008
2007
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007
2005
Proceedings of the Sixth International Conference on Parallel and Distributed Computing, 2005