Hongfeng Zhu
Orcid: 0000-0001-9910-3197
According to our database1,
Hongfeng Zhu
authored at least 80 papers
between 2006 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Quantum Inf. Process., November, 2024
A novel scalable three-level hierarchical quantum information splitting scheme for two-qubit unknown states.
Quantum Inf. Process., August, 2024
Secure mutual authentication quantum key agreement scheme for two-party setting with key recycling.
Quantum Inf. Process., April, 2024
A hybrid dynamic n-party quantum key exchange protocol based on three-particle GHZ states.
Quantum Inf. Process., March, 2024
2023
Drivers of the VR technologies user behaviour in e-commerce during the COVID-19 pandemic.
Electron. Commer. Res. Appl., November, 2023
2022
An Efficient Double-Offloading Biometric Authentication Scheme Based on Blockchain for Cross Domain Environment.
Wirel. Pers. Commun., 2022
Scalable multiple GHZ states equations and its applications in efficient quantum key agreement.
Quantum Inf. Process., 2022
Security analysis and improvements of a universal construction for a round-optimal password authenticated key exchange protocol.
Int. J. Inf. Comput. Secur., 2022
A <i>N</i>-party authenticated group key distribution protocol using quantum-reflection architecture.
Int. J. Inf. Comput. Secur., 2022
2021
One-round semi-quantum-honest key agreement scheme in MSTSA structure without entanglement.
Quantum Inf. Process., 2021
Quantum sealed-bid auction protocol for simultaneous ascending auction with GHZ states.
Quantum Inf. Process., 2021
Quantum Inf. Process., 2021
Int. J. Satell. Commun. Netw., 2021
2020
An efficient quantum identity authentication key agreement protocol without entanglement.
Quantum Inf. Process., 2020
Semi-quantum-honest key agreement scheme with three-particle entangled states in cross-realm setting.
Quantum Inf. Process., 2020
Two novel semi-quantum-reflection protocols applied in connected vehicle systems with blockchain.
Comput. Electr. Eng., 2020
2019
Wirel. Pers. Commun., 2019
A Three-Party Dynamic Identity-Based Authenticated Key Exchange Protocol with Forward Anonymity.
Wirel. Pers. Commun., 2019
J. Inf. Hiding Multim. Signal Process., 2019
A simplified deniable authentication scheme in cloud-based pay-TV system with privacy protection.
Int. J. Commun. Syst., 2019
2018
Provably Secure and Password-Authenticated Hybrid Key Agreement Protocol in Two-realm with Privacy-Protection.
J. Inf. Hiding Multim. Signal Process., 2018
J. Inf. Hiding Multim. Signal Process., 2018
J. Inf. Hiding Multim. Signal Process., 2018
Provably Secure and Distributed Authenticated Quantum Key Agreement Protocol with User-Privacy using Dynamic Basis.
J. Inf. Hiding Multim. Signal Process., 2018
Provably Secure and Password-Authenticated Quantum Key Agreement Protocol with Dynamic Basis.
J. Inf. Hiding Multim. Signal Process., 2018
Int. J. Netw. Secur., 2018
Provably Secure and Repeatable Authenticated Privacy-Protection Scheme Using Chaotic Maps with Distributed Architecture.
Int. J. Netw. Secur., 2018
2017
An Efficient Chaotic Maps-Based Deniable Authentication Group Key Agreement Protocol.
Wirel. Pers. Commun., 2017
Multi-party Password-Authenticated Key Exchange Scheme with Privacy Preserving using Chaotic Maps in Random Oracle Model.
J. Inf. Hiding Multim. Signal Process., 2017
Simple and Universal Construction for Round-Optimal Password Authenticated Key Exchange towards Quantum-Resistant.
J. Inf. Hiding Multim. Signal Process., 2017
Enhancing The Security of Chaotic Maps-based Password-Authenticated Key agreement Using Smart Card.
J. Inf. Hiding Multim. Signal Process., 2017
A Novel Two-party Scheme against Off-line Password Guessing Attacks using New Theorem of Chaotic maps.
KSII Trans. Internet Inf. Syst., 2017
An Improved Two-party Password-Authenticated Key Agreement Protocol with Privacy Protection Based on Chaotic Maps.
Int. J. Netw. Secur., 2017
A Novel and Concise Multi-receiver Protocol Based on Chaotic Maps with Privacy Protection.
Int. J. Netw. Secur., 2017
Two-phase Commit with Security Services: Using Distinctive Proofs to Relieve Fragile Communications.
Int. J. Netw. Secur., 2017
2016
J. Inf. Hiding Multim. Signal Process., 2016
A Multi-server Authenticated Key Agreement Protocol with Privacy preserving Based on Chaotic Maps in Random Oracle Model.
J. Inf. Hiding Multim. Signal Process., 2016
A Password-Authenticated Key Exchange Scheme Using Chaotic Maps towards Multiple Servers to Server.
J. Inf. Hiding Multim. Signal Process., 2016
J. Inf. Hiding Multim. Signal Process., 2016
An Efficient Human-Verifiable Key Agreement Scheme with Privacy Preserving with Human Bond Communication for Mobile Devices.
J. Inf. Hiding Multim. Signal Process., 2016
A Novel and Provable Authenticated Key Agreement Protocol with Privacy Protection Based on Chaotic Maps towards Mobile Network.
Int. J. Netw. Secur., 2016
A Provably Password Authenticated Key Exchange Scheme Based on Chaotic Maps in Different Realm.
Int. J. Netw. Secur., 2016
Password-Authenticated Key Exchange Scheme Using Chaotic Maps towards a New Architecture in Standard Model.
Int. J. Netw. Secur., 2016
A Novel One-Time Identity-Password Authenticated Scheme Based on Biometrics for E-coupon System.
Int. J. Netw. Secur., 2016
Provably Secure Multi-server Privacy-Protection System Based on Chebyshev Chaotic Maps without Using Symmetric Cryptography.
Int. J. Netw. Secur., 2016
A Novel Biometrics-based One-Time Commitment Authenticated Key Agreement Scheme with Privacy Protection for Mobile Network.
Int. J. Netw. Secur., 2016
Int. J. Netw. Secur., 2016
2015
Cryptanalysis and Improvement of a Mobile Dynamic ID Authenticated Key Agreement Scheme Based on Chaotic Maps.
Wirel. Pers. Commun., 2015
Flexible and Password-Authenticated Key Agreement Scheme Based on Chaotic Maps for Multiple Servers to Server Architecture.
Wirel. Pers. Commun., 2015
Cryptanalysis and provable improvement of a chaotic maps-based mobile dynamic ID authenticated key agreement scheme.
Secur. Commun. Networks, 2015
Secur. Commun. Networks, 2015
A One-Way Authentication Key Agreement Scheme with User Anonymity Based on Chaotic maps towards Multi-Server Architecture.
J. Inf. Hiding Multim. Signal Process., 2015
Enhanced Graphical Captcha Framework and Applications to Strong Security Authenticated Scheme without Password Table.
J. Inf. Hiding Multim. Signal Process., 2015
A Novel Client-to-Client Password-Authenticated Key Exchange Protocol using Chaotic Maps in the Standard Model.
J. Inf. Hiding Multim. Signal Process., 2015
An Effcient and Secure Biometrics-based One-Time Identity-Password Authenticated Scheme for E-coupon System towards Mobile Internet.
J. Inf. Hiding Multim. Signal Process., 2015
Three-party Authentication Key Agreement Protocol Based on Chaotic Maps in the Standard Model with Privacy Preserving.
J. Inf. Hiding Multim. Signal Process., 2015
Robust Biometrics-based Key Agreement Scheme with Smart Cards towards a New Architecture.
J. Inf. Hiding Multim. Signal Process., 2015
J. Inf. Hiding Multim. Signal Process., 2015
An Effcient Authenticated Key Agreement Protocol Based on Chaotic Maps with Privacy Protection using Smart Card.
J. Inf. Hiding Multim. Signal Process., 2015
A Provable One-way Authentication Key Agreement Scheme with User Anonymity for Multi-server Environment.
KSII Trans. Internet Inf. Syst., 2015
2014
Elliptic Curve Isogenies-Based Three-party Password Authenticated Key Agreement Scheme towards Quantum-Resistant.
J. Inf. Hiding Multim. Signal Process., 2014
J. Inf. Hiding Multim. Signal Process., 2014
A Multi-function Password Mutual Authentication Key Agreement Scheme with privacy preserving.
J. Inf. Hiding Multim. Signal Process., 2014
2013
Robust and Simple N-Party Entangled Authentication Cloud Storage Protocol Based on Secret Sharing Scheme.
J. Inf. Hiding Multim. Signal Process., 2013
2010
A Robust and Efficient Password-authenticated Key Agreement Scheme without Verification Table Based on Elliptic Curve Cryptosystem.
Proceedings of the International Conference on Computational Aspects of Social Networks, 2010
Proceedings of the International Conference on Computational Aspects of Social Networks, 2010
Proceedings of the International Conference on Computational Aspects of Social Networks, 2010
An ID-based Multi-server Authentication with Key Agreement Scheme without Verification Table on Elliptic Curve Cryptosystem.
Proceedings of the International Conference on Computational Aspects of Social Networks, 2010
Proceedings of the International Conference on Computational Aspects of Social Networks, 2010
Proceedings of the International Conference on Computational Aspects of Social Networks, 2010
2009
Proceedings of the 9th International Conference on Hybrid Intelligent Systems (HIS 2009), 2009
Proceedings of the 9th International Conference on Hybrid Intelligent Systems (HIS 2009), 2009
2008
EV-C2C-PAKE: An improved client-to-client password-authenticated key exchange protocol.
Comput. Syst. Sci. Eng., 2008
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008
2007
An Efficient Client-to-Client Password-Authenticated Key Exchange Resilient to Server Compromise.
Proceedings of the 13th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2007), 2007
A Method for Making Three-Party Password-Based Key Exchange Resilient to Server Compromise.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007
2006
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006