Peng Zhang
Orcid: 0000-0002-5335-5994Affiliations:
- Shenzhen University, ATR Key Laboratory of National Defense Technology, China
According to our database1,
Peng Zhang
authored at least 45 papers
between 2014 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
An Efficient Homomorphic Argmax Approximation for Privacy-Preserving Neural Networks.
Cryptogr., June, 2024
2023
Privacy-Preserving and Outsourced Multi-Party K-Means Clustering Based on Multi-Key Fully Homomorphic Encryption.
IEEE Trans. Dependable Secur. Comput., 2023
Achieving Maximum Efficiency in Schnorr-based Multi-signature and Applications in Blockchain.
CoRR, 2023
IEEE Access, 2023
A Blockchain-based Co-Simulation Platform for Transparent and Fair Energy Trading and Management.
Proceedings of the 5th ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2023
2022
IEEE Trans. Intell. Transp. Syst., 2022
PEMT-CoSim: A Co-Simulation Platform for Packetized Energy Management and Trading in Distributed Energy Systems.
Proceedings of the IEEE International Conference on Communications, 2022
2021
Secure and Efficient Multi-Signature Schemes for Fabric: An Enterprise Blockchain Platform.
IEEE Trans. Inf. Forensics Secur., 2021
2020
IEEE Trans. Emerg. Top. Comput., 2020
A Survey on Secure Computation Based on Homomorphic Encryption in Vehicular Ad Hoc Networks.
Sensors, 2020
Inf. Sci., 2020
Comput. Commun., 2020
Proceedings of the 20th IEEE International Conference on Communication Technology, 2020
2019
Blockchain Based Owner-Controlled Secure Software Updates for Resource-Constrained IoT.
Proceedings of the Network and System Security - 13th International Conference, 2019
Proceedings of the Computing, Communications and IoT Applications, ComComAp 2019, Shenzhen, 2019
2018
Time-Based Direct Revocable Ciphertext-Policy Attribute-Based Encryption with Short Revocation List.
IACR Cryptol. ePrint Arch., 2018
An efficient access control scheme with outsourcing capability and attribute update for fog computing.
Future Gener. Comput. Syst., 2018
Verifiable keyword search for secure big data-based mobile healthcare networks with fine-grained authorization control.
Future Gener. Comput. Syst., 2018
Proceedings of the Network and System Security - 12th International Conference, 2018
Proceedings of the Information Security Practice and Experience, 2018
An Efficient Multi-keyword Searchable Encryption Supporting Multi-user Access Control.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018
2017
Wirel. Pers. Commun., 2017
Utilizing fully homomorphic encryption to implement secure medical computation in smart cities.
Pers. Ubiquitous Comput., 2017
Ciphertext policy attribute-based encryption supporting unbounded attribute space from R-LWE.
KSII Trans. Internet Inf. Syst., 2017
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
Outsourcing Privacy Preserving ID3 Decision Tree Algorithm over Encrypted Data-sets for Two-Parties.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
Proceedings of the Provable Security, 2017
Proceedings of the Information Security Practice and Experience, 2017
Proceedings of the Information Security Practice and Experience, 2017
A Multi-client Dynamic Searchable Symmetric Encryption System with Physical Deletion.
Proceedings of the Information and Communications Security - 19th International Conference, 2017
Dynamic Data Operations with Deduplication in Privacy-Preserving Public Auditing for Secure Cloud Storage.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017
Attribute-Based Encryption Scheme Supporting Decryption Outsourcing and Attribute Revocation in Cloud Storage.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017
2016
Secur. Commun. Networks, 2016
Proceedings of the Provable Security, 2016
Proceedings of the 4th International Conference on Cloud Computing and Intelligence Systems, 2016
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
2015
A Fingerprint Encryption Scheme Based on Irreversible Function and Secure Authentication.
Comput. Math. Methods Medicine, 2015
2014
Wirel. Pers. Commun., 2014