Lei Zhang
Orcid: 0000-0001-8786-4562Affiliations:
- East China Normal University, Shanghai Key Laboratory of Trustworthy Computing, China
- Universitat Rovira i Virgili, Spain (PhD 2010)
- Nanjing Normal University, China (former)
According to our database1,
Lei Zhang
authored at least 84 papers
between 2007 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on orcid.org
On csauthors.net:
Bibliography
2024
IEEE Trans. Netw. Serv. Manag., August, 2024
IEEE Internet Things J., June, 2024
IEEE Trans. Inf. Forensics Secur., 2024
Comput. Stand. Interfaces, 2024
2023
IEEE Trans. Serv. Comput., 2023
Identity-Based Key Management Scheme for Secure Discussion Group Establishment in DOSNs.
IEEE Trans. Inf. Forensics Secur., 2023
Dynamic Authenticated Asymmetric Group Key Agreement With Sender Non-Repudiation and Privacy for Group-Oriented Applications.
IEEE Trans. Dependable Secur. Comput., 2023
Provably Secure Receiver-Unrestricted Group Key Management Scheme for Mobile Ad Hoc Networks.
Sensors, 2023
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023
2022
IEEE Trans. Veh. Technol., 2022
IEEE Trans. Serv. Comput., 2022
Privacy-Preserving Aggregation-Authentication Scheme for Safety Warning System in Fog-Cloud Based VANET.
IEEE Trans. Inf. Forensics Secur., 2022
IEEE Trans. Cloud Comput., 2022
A Secure and Receiver-Unrestricted Group Key Management Scheme for Mobile Ad-hoc Networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2022
Proceedings of the Algorithms and Architectures for Parallel Processing, 2022
2021
IEEE Trans. Cloud Comput., 2021
IEEE Internet Things J., 2021
IEEE Access, 2021
Proceedings of the IEEE Wireless Communications and Networking Conference, 2021
Proceedings of the Algorithms and Architectures for Parallel Processing, 2021
2020
Privacy-Preserving Cloud Establishment and Data Dissemination Scheme for Vehicular Cloud.
IEEE Trans. Dependable Secur. Comput., 2020
Key-Free Authentication Protocol Against Subverted Indoor Smart Devices for Smart Home.
IEEE Internet Things J., 2020
2019
Blockchain based secure data sharing system for Internet of vehicles: A position paper.
Veh. Commun., 2019
Int. J. Found. Comput. Sci., 2019
Proceedings of the Information Security and Cryptology - 15th International Conference, 2019
2018
Future Gener. Comput. Syst., 2018
Secure and privacy-preserving 3D vehicle positioning schemes for vehicular ad hoc network.
EURASIP J. Wirel. Commun. Netw., 2018
IEEE Access, 2018
2017
IEEE Trans. Intell. Transp. Syst., 2017
OTIBAAGKA: A New Security Tool for Cryptographic Mix-Zone Establishment in Vehicular Ad Hoc Networks.
IEEE Trans. Inf. Forensics Secur., 2017
Sender dynamic, non-repudiable, privacy-preserving and strong secure group communication protocol.
Inf. Sci., 2017
Int. J. Inf. Sec., 2017
2016
Privacy-Preserving Public Auditing Protocol for Low-Performance End Devices in Cloud.
IEEE Trans. Inf. Forensics Secur., 2016
Privacy-Preserving Vehicular Communication Authentication with Hierarchical Aggregation and Fast Response.
IEEE Trans. Computers, 2016
IEEE Trans. Computers, 2016
Future Gener. Comput. Syst., 2016
2015
Round-Efficient and Sender-Unrestricted Dynamic Group Key Agreement Protocol for Secure Group Communications.
IEEE Trans. Inf. Forensics Secur., 2015
Certificateless one-pass and two-party authenticated key agreement protocol and its extensions.
Inf. Sci., 2015
On the Security of MTA-OTIBASs (Multiple-TA One-Time Identity-Based Aggregate Signatures).
CoRR, 2015
On the Security of Privacy-Preserving Vehicular Communication Authentication with Hierarchical Aggregation and Fast Response.
CoRR, 2015
Practical secure and privacy-preserving scheme for value-added applications in VANETs.
Comput. Commun., 2015
Proceedings of the Information Security Practice and Experience, 2015
2014
Signatures in hierarchical certificateless cryptography: Efficient constructions and provable security.
Inf. Sci., 2014
Inf. Sci., 2014
Proceedings of the Information Security Practice and Experience, 2014
Security Enhanced Anonymous Remote User Authentication and Key Agreement for Cloud Computing.
Proceedings of the 17th IEEE International Conference on Computational Science and Engineering, 2014
2013
IEEE/ACM Trans. Netw., 2013
Secur. Commun. Networks, 2013
Corrigendum: "Provably-secure electronic cash based on certicateless partially-blind signatures".
Electron. Commer. Res. Appl., 2013
On the Security of a Privacy-Preserving Key Management Scheme for Location Based Services in VANETs.
Proceedings of the Foundations and Practice of Security - 6th International Symposium, 2013
Secure One-to-Group Communications Escrow-Free ID-Based Asymmetric Group Key Agreement.
Proceedings of the Information Security and Cryptology - 9th International Conference, 2013
Proceedings of the 27th IEEE International Conference on Advanced Information Networking and Applications, 2013
2012
Provably secure threshold public-key encryption with adaptive security and short ciphertexts.
Inf. Sci., 2012
Proceedings of the Internet and Distributed Computing Systems, 2012
Provably Secure Certificateless One-Way and Two-Party Authenticated Key Agreement Protocol.
Proceedings of the Information Security and Cryptology - ICISC 2012, 2012
Proceedings of the Distributed Computing and Networking - 13th International Conference, 2012
2011
Provably secure one-round identity-based authenticated asymmetric group key agreement protocol.
Inf. Sci., 2011
Electron. Commer. Res. Appl., 2011
Asymmetric group key agreement protocol for open networks and its application to broadcast encryption.
Comput. Networks, 2011
Proceedings of the Provable Security - 5th International Conference, 2011
Proceedings of the Information Security, 14th International Conference, 2011
Proceedings of the Information and Communications Security - 13th International Conference, 2011
Proceedings of the Advances in Cryptology - ASIACRYPT 2011, 2011
2010
IEEE Trans. Veh. Technol., 2010
Inf. Sci., 2010
IACR Cryptol. ePrint Arch., 2010
Comput. Networks, 2010
Proceedings of the IEEE 6th International Conference on Wireless and Mobile Computing, 2010
Proceedings of the Information and Communications Security - 12th International Conference, 2010
Proceedings of IEEE International Conference on Communications, 2010
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
2009
Proceedings of the Provable Security, Third International Conference, 2009
Proceedings of the Applied Algebra, 2009
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
2008
Proceedings of IEEE International Conference on Communications, 2008
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008
2007
Proceedings of the Provable Security, 2007
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2007