Huafei Zhu
Orcid: 0000-0001-5306-0646
According to our database1,
Huafei Zhu
authored at least 83 papers
between 2001 and 2022.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2022
CoRR, 2022
Proceedings of the Advanced Information Networking and Applications, 2022
Proceedings of the Advanced Information Networking and Applications, 2022
2021
A Lightweight, Anonymous and Confidential Genomic Computing for Industrial Scale Deployment.
CoRR, 2021
2020
On the relationship between (secure) multi-party computation and (secure) federated learning.
CoRR, 2020
CoRR, 2020
IEEE Access, 2020
2019
Proceedings of the Web Services - ICWS 2019, 2019
2018
Proceedings of the 6th International Conference on Information Technology: IoT and Smart City, 2018
2017
An efficient protocol for secure multicast key distribution in the presence of adaptive adversaries.
Sci. China Inf. Sci., 2017
Proceedings of the 2017 IEEE Global Communications Conference, 2017
2015
Proceedings of the International Telecommunication Networks and Applications Conference, 2015
Proceedings of the Trusted Systems - 7th International Conference, 2015
Proceedings of the Trusted Systems - 7th International Conference, 2015
2013
Proceedings of the Security and Privacy Protection in Information Processing Systems, 2013
2012
Proceedings of the ACM Symposium on Applied Computing, 2012
Proceedings of the 2012 IEEE International Conference on Intelligence and Security Informatics, 2012
Proceedings of the Engineering Secure Software and Systems - 4th International Symposium, 2012
2011
Proceedings of the Information Security Practice and Experience, 2011
Proceedings of the Information Security Practice and Experience, 2011
2010
Proceedings of the Third International Symposium on Intelligent Information Technology and Security Informatics, 2010
Universally Composable Non-committing Encryptions in the Presence of Adaptive Adversaries.
Proceedings of the e-Business and Telecommunications - 7th International Joint Conference, 2010
Proceedings of the e-Business and Telecommunications - 7th International Joint Conference, 2010
Proceedings of the Information Security and Cryptology - 6th International Conference, 2010
Proceedings of the Information Security and Privacy - 15th Australasian Conference, 2010
2009
Proceedings of the Information Security Practice and Experience, 2009
Proceedings of the Progress in Cryptology, 2009
Proceedings of the Information and Communications Security, 11th International Conference, 2009
Proceedings of the Cloud Computing, First International Conference, CloudCom 2009, Beijing, 2009
Mixed Commitments Mediated Transcoders: A Simple Implementation of Mercurial Mediated Transcoders.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009
Somewhat Secure Mobile Electronic-Voting Systems Based on the Cut-and-Choose Mechanism.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009
Constructing Universally Composable Oblivious Transfers from Double Trap-Door Encryptions.
Proceedings of the Progress in Cryptology, 2009
2008
Proceedings of the Provable Security, Second International Conference, 2008
Robust and Reliable Broadcast Protocols in the Stand-Alone and Simulation-Based Frameworks.
Proceedings of IEEE International Conference on Communications, 2008
Proceedings of the Cryptology and Network Security, 7th International Conference, 2008
Proceedings of the Information Security and Privacy, 13th Australasian Conference, 2008
2007
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007
Securing RFID Tags: Authentication Protocols with Completeness, Soundness, and Non-Traceability.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007
Proceedings of the 2007 ACM Symposium on Applied Computing (SAC), 2007
Proceedings of the Public Key Cryptography, 2007
Proceedings of the IEEE 18th International Symposium on Personal, 2007
Proceedings of the IEEE 18th International Symposium on Personal, 2007
Proceedings of the IEEE 18th International Symposium on Personal, 2007
Proceedings of IEEE International Conference on Communications, 2007
Proceedings of IEEE International Conference on Communications, 2007
Proceedings of IEEE International Conference on Communications, 2007
Secure Two-Party Computation of Squared Euclidean Distances in the Presence of Malicious Adversaries.
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007
2006
Int. J. Netw. Secur., 2006
Proceedings of the IEEE Wireless Communications and Networking Conference, 2006
Proceedings of the IEEE Wireless Communications and Networking Conference, 2006
Proceedings of the 63rd IEEE Vehicular Technology Conference, 2006
Proceedings of the Security and Privacy in Dynamic Environments, 2006
Proceedings of the Information Security Practice and Experience, 2006
Proceedings of the Information and Communications Security, 8th International Conference, 2006
Proceedings of the Topics in Cryptology, 2006
Proceedings of the Communications and Multimedia Security, 2006
Proceedings of the Information Security and Privacy, 11th Australasian Conference, 2006
Proceedings of the Information Security and Privacy, 11th Australasian Conference, 2006
2005
Proceedings of the IEEE Wireless Communications and Networking Conference, 2005
Proceedings of the IEEE Wireless Communications and Networking Conference, 2005
A Novel Construction of Two-Party Private Bidding Protocols from Yao's Millionaires Problem.
Proceedings of the Trust, 2005
Proceedings of the IEEE 16th International Symposium on Personal, 2005
Proceedings of the IEEE 16th International Symposium on Personal, 2005
Sequential Aggregate Signatures Working over Independent Homomorphic Trapdoor One-Way Permutation Domains.
Proceedings of the Information and Communications Security, 7th International Conference, 2005
Proceedings of the Information and Communications Security, 7th International Conference, 2005
Proceedings of the Computer Security, 2005
Compact Stimulation Mechanism for Routing Discovery Protocols in Civilian Ad-Hoc Networks.
Proceedings of the Communications and Multimedia Security, 2005
Proceedings of the Information Security and Cryptology, First SKLOIS Conference, 2005
2004
Constructing Committed Signatures from Strong-RSA Assumption in the Standard Complexity Model.
Proceedings of the Public Key Cryptography, 2004
Proceedings of the Information and Communications Security, 6th International Conference, 2004
Proceedings of the Grid and Cooperative Computing, 2004
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004
2003
IACR Cryptol. ePrint Arch., 2003
IACR Cryptol. ePrint Arch., 2003
A Practical Elliptic Curve Public Key Encryption Scheme Provably Secure Against Adaptive Chosen-message Attack.
IACR Cryptol. ePrint Arch., 2003
Proceedings of the Information and Communications Security, 5th International Conference, 2003
Proceedings of the Information and Communications Security, 5th International Conference, 2003
2002
Proceedings of the Public Key Cryptography, 2002
2001
Proceedings of the Information and Communications Security, Third International Conference, 2001