Rongquan Feng
According to our database1,
Rongquan Feng
authored at least 73 papers
between 1998 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
Appl. Math. Comput., 2025
2024
Appl. Algebra Eng. Commun. Comput., July, 2024
Privacy-Preserving Queries Using Multisource Private Data Counting on Real Numbers in IoT.
IEEE Internet Things J., April, 2024
Efficient Key Generation on Lattice Cryptography for Privacy Protection in Mobile IoT Crowdsourcing.
IEEE Internet Things J., January, 2024
2023
Efficient Multiparty Fully Homomorphic Encryption With Computation Fairness and Error Detection in Privacy Preserving Multisource Data Mining.
IEEE Trans. Reliab., December, 2023
2022
Attribute-Based Private Data Sharing With Script-Driven Programmable Ciphertext and Decentralized Key Management in Blockchain Internet of Things.
IEEE Internet Things J., 2022
2021
How to implement secure cloud file sharing using optimized attribute-based access control with small policy matrix and minimized cumulative errors.
Comput. Secur., 2021
Appl. Math. Comput., 2021
2020
Appl. Math. Comput., 2020
2019
Finite Fields Their Appl., 2019
New instant confirmation mechanism based on interactive incontestable signature in consortium blockchain.
Frontiers Comput. Sci., 2019
On arc-transitive pentavalent graphs of order 2<sup><i>m</i></sup><i>p<sup>n</sup></i>.
Appl. Math. Comput., 2019
FlashGhost: Data Sanitization with Privacy Protection Based on Frequent Colliding Hash Table.
Proceedings of the 2019 IEEE International Conference on Services Computing, 2019
2018
Sci. China Inf. Sci., 2018
2017
IET Inf. Secur., 2017
Finite Fields Their Appl., 2017
Des. Codes Cryptogr., 2017
Nonexistence of generalized bent functions from ℤ<sub>2</sub><sup>n</sup> to ℤ<sub>m</sub>.
Des. Codes Cryptogr., 2017
2016
Discret. Math., 2016
2015
On the Solvability of 3s/nt Sum-Network - A Region Decomposition and Weak Decentralized Code Method.
CoRR, 2015
Proceedings of the Digital-Forensics and Watermarking - 14th International Workshop, 2015
2014
Finding normal bases over finite fields with prescribed trace self-orthogonal relations.
Finite Fields Their Appl., 2014
Sci. China Inf. Sci., 2014
2013
IEEE Trans. Inf. Theory, 2013
Phys. Commun., 2013
Efficient Identity-Based Encryption without Pairings and Key Escrow for Mobile Devices.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2013
Proceedings of the Theory and Applications of Models of Computation, 2013
2012
IACR Cryptol. ePrint Arch., 2012
Finite Fields Their Appl., 2012
Finite Fields Their Appl., 2012
Proceedings of the Information Technology Convergence, Secure and Trust Computing, and Data Management, 2012
Proceedings of the 2012 IEEE International Symposium on Information Theory, 2012
Proceedings of the Progress in Cryptology, 2012
Proceedings of the 9th International Conference on Fuzzy Systems and Knowledge Discovery, 2012
2011
2010
J. Comput. Sci. Technol., 2010
IACR Cryptol. ePrint Arch., 2010
A Generalized Construction of OFDM M-QAM Sequences With Low Peak-to-Average Power Ratio
CoRR, 2010
Encoding Complexity for Intersession Network Coding with Two Simple Multicast Sessions
CoRR, 2010
CoRR, 2010
2009
Discret. Math., 2009
A generalized construction of OFDM <i>M</i>-QAM sequences with low peak-to-average power ratio.
Adv. Math. Commun., 2009
2008
2007
SIAM J. Discret. Math., 2007
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007
Encapsulated Scalar Multiplications and Line Functions in the Computation of Tate Pairing.
Proceedings of the Theory and Applications of Models of Computation, 2007
2006
Eur. J. Comb., 2006
2005
SIAM J. Discret. Math., 2005
2004
1998