Rong Hao
Orcid: 0000-0002-2878-6661
According to our database1,
Rong Hao
authored at least 68 papers
between 2006 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
Future Gener. Comput. Syst., 2025
2024
IEEE Internet Things J., December, 2024
IEEE Trans. Ind. Informatics, October, 2024
Comput. Secur., January, 2024
IEEE Trans. Serv. Comput., 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Dependable Secur. Comput., 2024
Inf. Sci., 2024
2023
IEEE Syst. J., December, 2023
Enabling Secure Data sharing with data deduplication and sensitive information hiding in cloud-assisted Electronic Medical Systems.
Clust. Comput., December, 2023
Verifiable fuzzy keyword search supporting sensitive information hiding for data sharing in cloud-assisted e-healthcare systems.
J. Syst. Archit., September, 2023
Secure auditing and deduplication with efficient ownership management for cloud storage.
J. Syst. Archit., September, 2023
IEEE Syst. J., June, 2023
Privacy-Preserving Face Recognition With Multi-Edge Assistance for Intelligent Security Systems.
IEEE Internet Things J., 2023
2022
Verifiable Keyword Search Supporting Sensitive Information Hiding for the Cloud-Based Healthcare Sharing System.
IEEE Trans. Ind. Informatics, 2022
IEEE Trans. Comput. Soc. Syst., 2022
A Secure Encrypted Data Deduplication Scheme Based on Data Popularity Supporting Dynamic Ownership Management.
Proceedings of the 5th International Conference on Big Data Technologies, 2022
2021
Comments on "SEPDP: Secure and Efficient Privacy Preserving Provable Data Possession in Cloud Storage".
IEEE Trans. Serv. Comput., 2021
Towards Achieving Keyword Search over Dynamic Encrypted Cloud Data with Symmetric-Key Based Verification.
IEEE Trans. Dependable Secur. Comput., 2021
IEEE Trans. Cloud Comput., 2021
Proceedings of the ICBDT 2021: 4th International Conference on Big Data Technologies, Zibo, China, September 24, 2021
2020
J. Supercomput., 2020
Enabling Efficient User Revocation in Identity-Based Cloud Storage Auditing for Shared Big Data.
IEEE Trans. Dependable Secur. Comput., 2020
J. Internet Serv. Inf. Secur., 2020
Lightweight Cloud Storage Auditing With Deduplication Supporting Strong Privacy Protection.
IEEE Access, 2020
2019
Enabling Identity-Based Integrity Auditing and Data Sharing With Sensitive Information Hiding for Secure Cloud Storage.
IEEE Trans. Inf. Forensics Secur., 2019
Cloud storage auditing with deduplication supporting different security levels according to data popularity.
J. Netw. Comput. Appl., 2019
A Note on "Enhancing cloud storage security against a new replay attack with an efficient public auditing scheme".
Proceedings of the 2nd International Conference on Big Data Technologies, 2019
2018
Intrusion-resilient identity-based signatures: Concrete scheme in the standard model and generic construction.
Inf. Sci., 2018
Provable Multiple-Replica Dynamic Data Possession for Big Data Storage in Cloud Computing.
Int. J. Netw. Secur., 2018
Enabling secure auditing and deduplicating data without owner-relationship exposure in cloud storage.
Clust. Comput., 2018
Enabling Efficient Verifiable Fuzzy Keyword Search Over Encrypted Data in Cloud Computing.
IEEE Access, 2018
A hybrid differential evolution and estimation of distribution algorithm for the multi-point dynamic aggregation problem.
Proceedings of the Genetic and Evolutionary Computation Conference Companion, 2018
2017
J. Syst. Softw., 2017
Light-weight and privacy-preserving secure cloud auditing scheme for group users via the third party medium.
J. Netw. Comput. Appl., 2017
J. Internet Serv. Inf. Secur., 2017
Enabling efficient and verifiable multi-keyword ranked search over encrypted cloud data.
Inf. Sci., 2017
Remote data possession checking with privacy-preserving authenticators for cloud storage.
Future Gener. Comput. Syst., 2017
2016
Wirel. Pers. Commun., 2016
Enabling public auditing for shared data in cloud storage supporting identity privacy and traceability.
J. Syst. Softw., 2016
Access-Authorizing and Privacy-Preserving Auditing with Group Dynamic for Shared Cloud Data.
KSII Trans. Internet Inf. Syst., 2016
Int. J. High Perform. Syst. Archit., 2016
A Note on "IPad: ID-Based Public Auditing for the Outsourced Data in the Standard Model".
Proceedings of the Cloud Computing and Security - Second International Conference, 2016
2015
Proceedings of the 10th International Conference on P2P, 2015
Proceedings of the 10th International Conference on P2P, 2015
2014
Inf. Sci., 2014
2013
Int. J. Secur. Networks, 2013
2012
J. Syst. Softw., 2012
J. Inf. Sci. Eng., 2012
Erratum to the paper: Forward-Secure Identity-Based Public-Key Encryption without Random Oracles.
Fundam. Informaticae, 2012
2011
Inf. Sci., 2011
Fundam. Informaticae, 2011
Proceedings of the Intelligence and Security Informatics - Pacific Asia Workshop, 2011
2010
J. Networks, 2010
2009
J. Softw., 2009
2008
How to Construct Forward Secure Single-Server, Multi-Server and Threshold-Server Assisted Signature Schemes Using Bellare-Miner Scheme.
J. Commun., 2008
J. Commun., 2008
Proceedings of the Ninth International Conference on Web-Age Information Management, 2008
Proceedings of the Provable Security, Second International Conference, 2008
Proceedings of the Provable Security, Second International Conference, 2008
How to Publicly Verifiably Expand a Member without Changing Old Shares in a Secret Sharing Scheme.
Proceedings of the Intelligence and Security Informatics, 2008
Proceedings of The International Symposium on Electronic Commerce and Security, 2008
2007
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007
2006
Proceedings of the Computational Intelligence and Security, International Conference, 2006