Huanguo Zhang
Orcid: 0009-0005-5337-3091
According to our database1,
Huanguo Zhang
authored at least 127 papers
between 2003 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
Comput. Stand. Interfaces, 2025
2024
Analysis and Improvement of a Conditional Privacy-Preserving Authentication Scheme With Double-Insurance in VANETs.
IEEE Trans. Veh. Technol., November, 2024
IEEE Trans. Veh. Technol., January, 2024
2023
IEEE Internet Things J., October, 2023
Proceedings of the Provable and Practical Security, 2023
2022
Lattice-Based Self-Enhancement Authorized Accessible Privacy Authentication for Cyber-Physical Systems.
Secur. Commun. Networks, 2022
Sci. China Inf. Sci., 2022
2020
A pre-silicon logic level security verification flow for higher-order masking schemes against glitches on FPGAs.
Integr., 2020
zkrpChain: Privacy-preserving Data Auditing for Consortium Blockchains Based on Zero-knowledge Range Proofs.
Proceedings of the 19th IEEE International Conference on Trust, 2020
Proceedings of the Information and Communications Security - 22nd International Conference, 2020
Invariance of Algebraic Immunity of Vectorial Boolean Functions under Equivalence Relations.
Proceedings of the 14th IEEE International Conference on Big Data Science and Engineering, 2020
2019
A quantum query algorithm for computing the degree of a perfect nonlinear Boolean function.
Quantum Inf. Process., 2019
Quantum Private Comparison Protocols With a Number of Multi-Particle Entangled States.
IEEE Access, 2019
2018
IEEE Trans. Inf. Forensics Secur., 2018
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2018
Several weaknesses of the implementation for the theoretically secure masking schemes under ISW framework.
Integr., 2018
A Novel Key Agreement Protocol Based on RET Gadget Chains for Preventing Reused Code Attacks.
IEEE Access, 2018
2017
A New Method to Analyze the Security of Protocol Implementations Based on Ideal Trace.
Secur. Commun. Networks, 2017
Quantum Inf. Process., 2017
Proceedings of the Information and Communications Security - 19th International Conference, 2017
2016
A formal analysis of Trusted Platform Module 2.0 hash-based message authentication code authorization under digital rights management scenario.
Secur. Commun. Networks, 2016
Secur. Commun. Networks, 2016
云环境下基于代数签名持有性审计的大数据安全存储方案 (Big Data Storage Security Scheme Based on Algebraic Signature Possession Audit in Cloud Environment).
计算机科学, 2016
Int. J. Embed. Syst., 2016
Sci. China Inf. Sci., 2016
Sci. China Inf. Sci., 2016
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
A Linear Algebra Attack on the Non-commuting Cryptography Class Based on Matrix Power Function.
Proceedings of the Information Security and Cryptology - 12th International Conference, 2016
2015
Polynomial-time quantum algorithms for finding the linear structures of Boolean function.
Quantum Inf. Process., 2015
Quantum Inf. Process., 2015
Sci. China Inf. Sci., 2015
Sci. China Inf. Sci., 2015
Proceedings of the Information Security and Cryptology - ICISC 2015, 2015
2014
Power analysis based reverse engineering on the secret round function of block ciphers.
Concurr. Comput. Pract. Exp., 2014
Sci. China Inf. Sci., 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
Proceedings of the 2014 Ninth International Conference on P2P, 2014
2013
IACR Cryptol. ePrint Arch., 2013
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
Integrity Protection and Attestation of Security Critical Executions on Virtualized Platform in Cloud Computing Environment.
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013
2012
IACR Cryptol. ePrint Arch., 2012
Evolutionary cryptography theory based generating method for a secure Koblitz elliptic curve and its improvement by a hidden Markov models.
Sci. China Inf. Sci., 2012
Proceedings of the 11th IEEE International Conference on Trust, 2012
Power Analysis Based Reverse Engineering on the Secret Round Function of Block Ciphers.
Proceedings of the Data and Knowledge Engineering - Third International Conference, 2012
2011
J. Softw., 2011
Sci. China Inf. Sci., 2011
Sci. China Inf. Sci., 2011
Sci. China Inf. Sci., 2011
Proceedings of the Autonomic and Trusted Computing - 8th International Conference, 2011
2010
J. Digit. Content Technol. its Appl., 2010
IACR Cryptol. ePrint Arch., 2010
Research on theory and key technology of trusted computing platform security testing and evaluation.
Sci. China Inf. Sci., 2010
Sci. China Inf. Sci., 2010
2009
Int. J. Inf. Comput. Secur., 2009
Proceedings of the First IITA International Joint Conference on Artificial Intelligence, 2009
Proceedings of the 2009 Second International Symposium on Computational Intelligence and Design, 2009
Proceedings of the International Forum on Information Technology and Applications, 2009
Research and Implement of Secure Bootstrap for Virtual Machine Based on Trusted Computing Platform.
Proceedings of the Eighth IEEE International Conference on Dependable, 2009
Proceedings of the Eighth IEEE International Conference on Dependable, 2009
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
Proceedings of the Ninth IEEE International Conference on Computer and Information Technology, 2009
Proceedings of the Ninth IEEE International Conference on Computer and Information Technology, 2009
Proceedings of the Ninth IEEE International Conference on Computer and Information Technology, 2009
2008
Proceedings of the International Workshop on Knowledge Discovery and Data Mining, 2008
Proceedings of the International Workshop on Knowledge Discovery and Data Mining, 2008
Proceedings of the Ninth ACIS International Conference on Software Engineering, 2008
Proceedings of the International Symposium on Information Processing, 2008
Proceedings of the Advances in Computation and Intelligence, Third International Symposium, 2008
Proceedings of the Advances in Computation and Intelligence, Third International Symposium, 2008
Proceedings of The International Symposium on Electronic Commerce and Security, 2008
Proceedings of The International Symposium on Electronic Commerce and Security, 2008
Proceedings of The International Symposium on Electronic Commerce and Security, 2008
Proceedings of the 22nd IEEE International Symposium on Parallel and Distributed Processing, 2008
Proceedings of the 9th International Conference for Young Computer Scientists, 2008
Design and Implementation of an Integrity Measurement System Based on Windows Trusted Computing Platform.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008
Proceedings of the 9th International Conference for Young Computer Scientists, 2008
Proceedings of the 9th International Conference for Young Computer Scientists, 2008
Secure Key Management of Mobile Agent System Using TPM-Based Technology on Trusted Computing Platform.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008
Proceedings of the Second Asia International Conference on Modelling and Simulation, 2008
PerformTrust: Trust model integrated past and current performance in P2P file sharing systems.
Proceedings of the 6th ACS/IEEE International Conference on Computer Systems and Applications, 2008
2007
Proceedings of the Arithmetic of Finite Fields, First International Workshop, 2007
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007
Efficient Modular Exponentiation with Three-Moduli (2<sup>n</sup> 1, 2<sup>n</sup>+3).
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007
Speeding Up Scalar Multiplication Using a New Signed Binary Representation for Integers.
Proceedings of the Multimedia Content Analysis and Mining, International Workshop, 2007
Proceedings of the Advances in Computation and Intelligence, 2007
Proceedings of the Integration and Innovation Orient to E-Society, 2007
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007
2006
Proceedings of the Security Protocols, 2006
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006
Proceedings of the Autonomic and Trusted Computing, Third International Conference, 2006
Proceedings of the Autonomic and Trusted Computing, Third International Conference, 2006
2005
Proceedings of the Grid and Cooperative Computing - GCC 2005, 4th International Conference, Beijing, China, November 30, 2005
The Practical Detailed Requirements of Accountability and Its Application in the Electronic Payment Protocols.
Proceedings of the 2005 IEEE International Conference on e-Technology, e-Commerce, and e-Services (EEE 2005), 29 March, 2005
Proceedings of the Ninth International Conference on Computer Supported Cooperative Work in Design, 2005
Proceedings of the Advances in Computer Science, 2005
Proceedings of the Fifth International Conference on Computer and Information Technology (CIT 2005), 2005
2004
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2004
Proceedings of the 2004 International Conference on Computer and Information Technology (CIT 2004), 2004
2003
A Research on Intrusion Detection Based on Unsupervised Clustering and Support Vector Machine.
Proceedings of the Information and Communications Security, 5th International Conference, 2003