Rong Hao

Orcid: 0000-0002-2878-6661

According to our database1, Rong Hao authored at least 68 papers between 2006 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Popularity-based multiple-replica cloud storage integrity auditing for big data.
Future Gener. Comput. Syst., 2025

2024
Enabling Privacy-Preserving Boolean kNN Query Over Cloud-Based Spatial Data.
IEEE Internet Things J., December, 2024

Privacy-Preserving Naïve Bayesian Classification for Health Monitoring Systems.
IEEE Trans. Ind. Informatics, October, 2024

Towards efficient Secure Boolean Range Query over encrypted spatial data.
Comput. Secur., January, 2024

Enabling Privacy-Preserving $K$K-Hop Reachability Query Over Encrypted Graphs.
IEEE Trans. Serv. Comput., 2024

Privacy-Preserving Time-Based Auditing for Secure Cloud Storage.
IEEE Trans. Inf. Forensics Secur., 2024

Privacy-Preserving Graph Matching Query Supporting Quick Subgraph Extraction.
IEEE Trans. Dependable Secur. Comput., 2024

Enabling privacy-preserving non-interactive computation for Hamming distance.
Inf. Sci., 2024

2023
Lightweight Secure Deduplication Based on Data Popularity.
IEEE Syst. J., December, 2023

Enabling Secure Data sharing with data deduplication and sensitive information hiding in cloud-assisted Electronic Medical Systems.
Clust. Comput., December, 2023

Verifiable fuzzy keyword search supporting sensitive information hiding for data sharing in cloud-assisted e-healthcare systems.
J. Syst. Archit., September, 2023

Secure auditing and deduplication with efficient ownership management for cloud storage.
J. Syst. Archit., September, 2023

Privacy-Preserving Shortest Distance Query for Dynamic Large-Scale Road Network.
IEEE Syst. J., June, 2023

Privacy-Preserving Face Recognition With Multi-Edge Assistance for Intelligent Security Systems.
IEEE Internet Things J., 2023

2022
Verifiable Keyword Search Supporting Sensitive Information Hiding for the Cloud-Based Healthcare Sharing System.
IEEE Trans. Ind. Informatics, 2022

Secure Edge-Aided Computations for Social Internet-of-Things Systems.
IEEE Trans. Comput. Soc. Syst., 2022

A Secure Encrypted Data Deduplication Scheme Based on Data Popularity Supporting Dynamic Ownership Management.
Proceedings of the 5th International Conference on Big Data Technologies, 2022

2021
Comments on "SEPDP: Secure and Efficient Privacy Preserving Provable Data Possession in Cloud Storage".
IEEE Trans. Serv. Comput., 2021

Towards Achieving Keyword Search over Dynamic Encrypted Cloud Data with Symmetric-Key Based Verification.
IEEE Trans. Dependable Secur. Comput., 2021

Data Integrity Auditing without Private Key Storage for Secure Cloud Storage.
IEEE Trans. Cloud Comput., 2021

Privacy-Preserving Phrase Search over Encrypted Data.
Proceedings of the ICBDT 2021: 4th International Conference on Big Data Technologies, Zibo, China, September 24, 2021

2020
Comment on "Privacy-preserving public auditing for non-manager group shared data".
J. Supercomput., 2020

Enabling Efficient User Revocation in Identity-Based Cloud Storage Auditing for Shared Big Data.
IEEE Trans. Dependable Secur. Comput., 2020

Secure Computation Outsourcing for Inversion in Finite Field.
J. Internet Serv. Inf. Secur., 2020

Lightweight Cloud Storage Auditing With Deduplication Supporting Strong Privacy Protection.
IEEE Access, 2020

2019
Enabling Identity-Based Integrity Auditing and Data Sharing With Sensitive Information Hiding for Secure Cloud Storage.
IEEE Trans. Inf. Forensics Secur., 2019

Cloud storage auditing with deduplication supporting different security levels according to data popularity.
J. Netw. Comput. Appl., 2019

Forward Secure Conjunctive-Keyword Searchable Encryption.
IEEE Access, 2019

A Note on "Enhancing cloud storage security against a new replay attack with an efficient public auditing scheme".
Proceedings of the 2nd International Conference on Big Data Technologies, 2019

2018
Intrusion-resilient identity-based signatures: Concrete scheme in the standard model and generic construction.
Inf. Sci., 2018

Provable Multiple-Replica Dynamic Data Possession for Big Data Storage in Cloud Computing.
Int. J. Netw. Secur., 2018

Enabling secure auditing and deduplicating data without owner-relationship exposure in cloud storage.
Clust. Comput., 2018

Enabling Efficient Verifiable Fuzzy Keyword Search Over Encrypted Data in Cloud Computing.
IEEE Access, 2018

A hybrid differential evolution and estimation of distribution algorithm for the multi-point dynamic aggregation problem.
Proceedings of the Genetic and Evolutionary Computation Conference Companion, 2018

2017
How to securely outsource the inversion modulo a large composite number.
J. Syst. Softw., 2017

Light-weight and privacy-preserving secure cloud auditing scheme for group users via the third party medium.
J. Netw. Comput. Appl., 2017

An Efficient Symmetric Searchable Encryption Scheme for Cloud Storage.
J. Internet Serv. Inf. Secur., 2017

Enabling efficient and verifiable multi-keyword ranked search over encrypted cloud data.
Inf. Sci., 2017

Remote data possession checking with privacy-preserving authenticators for cloud storage.
Future Gener. Comput. Syst., 2017

2016
Forward-Secure Identity-Based Signature Scheme in Untrusted Update Environments.
Wirel. Pers. Commun., 2016

Enabling public auditing for shared data in cloud storage supporting identity privacy and traceability.
J. Syst. Softw., 2016

Access-Authorizing and Privacy-Preserving Auditing with Group Dynamic for Shared Cloud Data.
KSII Trans. Internet Inf. Syst., 2016

IRIBE: Intrusion-resilient identity-based encryption.
Inf. Sci., 2016

A public cloud storage auditing scheme for resource-constrained clients.
Int. J. High Perform. Syst. Archit., 2016

A Note on "IPad: ID-Based Public Auditing for the Outsourced Data in the Standard Model".
Proceedings of the Cloud Computing and Security - Second International Conference, 2016

2015
A Public Cloud Storage Auditing Scheme with Lightweight Authenticator Generation.
Proceedings of the 10th International Conference on P2P, 2015

A Novel Privacy Preserving Keyword Search Scheme over Encrypted Cloud Data.
Proceedings of the 10th International Conference on P2P, 2015

2014
One forward-secure signature scheme using bilinear maps and its applications.
Inf. Sci., 2014

Key-insulated aggregate signature.
Frontiers Comput. Sci., 2014

2013
Security analysis and improvement of two verifiable multi-secret sharing schemes.
Int. J. Secur. Networks, 2013

2012
Intrusion-resilient identity-based signature: Security definition and construction.
J. Syst. Softw., 2012

Non-Interactive Forward-Secure Threshold Signature without Random Oracles.
J. Inf. Sci. Eng., 2012

Erratum to the paper: Forward-Secure Identity-Based Public-Key Encryption without Random Oracles.
Fundam. Informaticae, 2012

2011
New Forward-Secure Signature Scheme with Untrusted Update.
J. Inf. Sci. Eng., 2011

Forward-secure identity-based signature: Security notions and construction.
Inf. Sci., 2011

Forward-Secure Identity-Based Public-Key Encryption without Random Oracles.
Fundam. Informaticae, 2011

Two Protocols for Member Revocation in Secret Sharing Schemes.
Proceedings of the Intelligence and Security Informatics - Pacific Asia Workshop, 2011

2010
Forward-Secure Multisignature, Threshold Signature and Blind Signature Schemes.
J. Networks, 2010

2009
A Forward Secure Threshold Signature Scheme Based on the Structure of Binary Tree.
J. Softw., 2009

2008
How to Construct Forward Secure Single-Server, Multi-Server and Threshold-Server Assisted Signature Schemes Using Bellare-Miner Scheme.
J. Commun., 2008

Publicly Verifiable Secret Sharing Member-join Protocol For Threshold Signatures.
J. Commun., 2008

A Publicly Verifiable Dynamic Sharing Protocol for Data Secure Storage.
Proceedings of the Ninth International Conference on Web-Age Information Management, 2008

Cryptanalysis of Vo-Kim Forward Secure Signature in ICISC 2005.
Proceedings of the Provable Security, Second International Conference, 2008

Construction of Yet Another Forward Secure Signature Scheme Using Bilinear Maps.
Proceedings of the Provable Security, Second International Conference, 2008

How to Publicly Verifiably Expand a Member without Changing Old Shares in a Secret Sharing Scheme.
Proceedings of the Intelligence and Security Informatics, 2008

Construction of Server-assisted Forward Secure Signature Using Bellare-Miner Scheme.
Proceedings of The International Symposium on Electronic Commerce and Security, 2008

2007
Publicly Verifiable Secret Sharing with Enrollment Ability.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

2006
Forward Secure Threshold Signature Scheme from Bilinear Pairings.
Proceedings of the Computational Intelligence and Security, International Conference, 2006


  Loading...