Lidong Han

Orcid: 0000-0003-2094-5629

According to our database1, Lidong Han authored at least 32 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A collusion-resistant certificateless provable data possession scheme for shared data with user revocation.
Clust. Comput., April, 2024

Key Reuse Attacks on Post-quantum Cryptosystems, Revisited.
Comput. J., January, 2024

A blockchain-based framework for federated learning with privacy preservation in power load forecasting.
Knowl. Based Syst., 2024

2023
Verifiable attribute-based keyword search scheme over encrypted data for personal health records in cloud.
J. Cloud Comput., December, 2023

Proof of retrievability with flexible designated verification for cloud storage.
Comput. Secur., December, 2023

Cryptanalysis of Two Public Key Encryption Schemes with Multi-keyword Search.
Wirel. Pers. Commun., June, 2023

Plaintext Related Optical Image Hybrid Encryption Based on Fractional Fourier Transform and Generalized Chaos of Multiple Controlling Parameters.
J. Grid Comput., March, 2023

Comments on "An Efficient Identity-Based Provable Data Possession Protocol with Compressed Cloud Storage".
IEEE Trans. Inf. Forensics Secur., 2023

CACPA: Credible Alliance-Chain-Based Public Auditing Scheme for Cloud Storage.
IEEE Access, 2023

IGA : An Improved Genetic Algorithm to Construct Weightwise (Almost) Perfectly Balanced Boolean Functions with High Weightwise Nonlinearity.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023

2022
An improved secure certificateless public-key searchable encryption scheme with multi-trapdoor privacy.
Peer-to-Peer Netw. Appl., 2022

An improved secure designated server public key searchable encryption scheme with multi-ciphertext indistinguishability.
J. Cloud Comput., 2022

Privacy-Preserving and Verifiable Cloud-Aided Disease Diagnosis and Prediction With Hyperplane Decision-Based Classifier.
IEEE Internet Things J., 2022

Cryptanalysis of an Identity-Based Provable Data Possession Protocol with Compressed Cloud Storage.
IACR Cryptol. ePrint Arch., 2022

On the Security of Verifiable Privacy-preserving Multi-type Data Aggregation Scheme in Smart Grid.
Proceedings of the International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2022

2021
A secure and privacy-preserving authentication protocol for wireless sensor networks in smart city.
EURASIP J. Wirel. Commun. Netw., 2021

An Efficient and Secure Public Key Authenticated Encryption With Keyword Search in the Logarithmic Time.
IEEE Access, 2021

Lattice Attacks on NTRU Revisited.
IEEE Access, 2021

2018
An efficient and secure three-factor based authenticated key exchange scheme using elliptic curve cryptosystems.
Peer-to-Peer Netw. Appl., 2018

2017
A New Efficient Chaotic Maps Based Three Factor User Authentication and Key Agreement Scheme.
Wirel. Pers. Commun., 2017

An Improved Biometric Based Authentication Scheme with User Anonymity Using Elliptic Curve Cryptosystem.
Int. J. Netw. Secur., 2017

2016
Efficient and secure multi-functional searchable symmetric encryption schemes.
Secur. Commun. Networks, 2016

Efficient wildcard search over encrypted data.
Int. J. Inf. Sec., 2016

2014
Improvement of a Uniqueness-and-Anonymity-Preserving User Authentication Scheme for Connected Health Care.
J. Medical Syst., 2014

Pairing-Free Certificateless Signature with Security Proof.
J. Comput. Networks Commun., 2014

A polynomial time algorithm for GapCVPP in l 1 norm.
Sci. China Inf. Sci., 2014

Efficient Approximate Search Using VGRAM Over Encrypted Cloud Data.
Proceedings of the Second International Conference on Advanced Cloud and Big Data, 2014

2012
On the Multiple Fault Attack on RSA Signatures with LSBs of Messages Unknown.
IACR Cryptol. ePrint Arch., 2012

On the Multiple Fault Attacks on RSA Signatures with LSBs of Messages Unknown.
Proceedings of the Information Security and Cryptology - 8th International Conference, 2012

2010
On an attack on RSA with small CRT-exponents.
Sci. China Inf. Sci., 2010

2009
Pseudo-Cryptanalysis of Luffa.
IACR Cryptol. ePrint Arch., 2009

Cryptanalysis of two knapsack public-key cryptosystems.
IACR Cryptol. ePrint Arch., 2009


  Loading...