Runhua Shi
This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.
Bibliography
2024
Quantum Inf. Process., May, 2024
IEEE Trans. Netw. Sci. Eng., 2024
Dynamic Range Query Privacy-Preserving Scheme for Blockchain-Enhanced Smart Grid Based on Lattice.
IEEE Trans. Dependable Secur. Comput., 2024
WT-CFormer: High-Performance Web Traffic Anomaly Detection Using CNN and Transformer Networks.
CoRR, 2024
2023
Privacy-Preserving Range Query Quantum Scheme With Single Photons in Edge-Based Internet of Things.
IEEE Trans. Netw. Serv. Manag., December, 2023
Verifiable outsourcing EMRs scheme with attribute-based encryption in cloud-edge environments.
J. Inf. Secur. Appl., August, 2023
VC-DCPS: Verifiable Cross-Domain Data Collection and Privacy-Persevering Sharing Scheme Based on Lattice in Blockchain-Enhanced Smart Grids.
IEEE Internet Things J., July, 2023
A dual auditing protocol for fine-grained access control in the edge-cloud-based smart home.
Comput. Networks, June, 2023
Quantum Inf. Process., January, 2023
Comment on "Multi-Keyword Searchable and Verifiable Attribute-Based Encryption Over Cloud Data".
IEEE Trans. Cloud Comput., 2023
A Flexible and Efficient Privacy-Preserving Range Query Scheme for Blockchain-Enhanced IoT.
IEEE Internet Things J., 2023
2022
IEEE Trans. Circuits Syst. II Express Briefs, 2022
Quantum Protocol for Secure Multiparty Logical AND With Application to Multiparty Private Set Intersection Cardinality.
IEEE Trans. Circuits Syst. I Regul. Pap., 2022
Quantum Private Set Intersection Cardinality Protocol With Application to Privacy-Preserving Condition Query.
IEEE Trans. Circuits Syst. I Regul. Pap., 2022
Quantum Inf. Process., 2022
Quantum Inf. Process., 2022
Quantum Inf. Process., 2022
A novel privacy-preserving multi-level aggregate signcryption and query scheme for Smart Grid via mobile fog computing.
J. Inf. Secur. Appl., 2022
Multiple access control scheme for EHRs combining edge computing with smart contracts.
Future Gener. Comput. Syst., 2022
Attribute-based data access control scheme with secure revocation in fog computing for smart grid.
Clust. Comput., 2022
2021
IEEE Trans. Circuits Syst. II Express Briefs, 2021
IEEE Trans. Circuits Syst. I Regul. Pap., 2021
Quantum Inf. Process., 2021
IEEE Commun. Lett., 2021
A lightweight privacy-preserving and sharing scheme with dual-blockchain for intelligent pricing system of smart grid.
Comput. Secur., 2021
Proceedings of the 5th IEEE International Conference on Cryptography, Security and Privacy, 2021
2020
Comment on "Controlled mutual quantum entity authentication with an untrusted third party".
Quantum Inf. Process., 2020
Quantum Inf. Process., 2020
IEEE Commun. Lett., 2020
Proceedings of the IEEE Intl Conf on Dependable, 2020
2019
Quantum Inf. Process., 2019
Int. J. Netw. Secur., 2019
IEEE Access, 2019
Proceedings of the 3rd International Conference on Computer Science and Application Engineering, 2019
2018
Quantum Inf. Process., 2018
Quantum Inf. Process., 2018
An efficient certificateless aggregate signature without pairings for vehicular ad hoc networks.
Inf. Sci., 2018
Int. J. Secur. Networks, 2018
An adaptive high-fidelity steganographic scheme using edge detection and hybrid hamming codes.
Displays, 2018
IEEE Access, 2018
2017
Quantum Inf. Process., 2017
Quantum Inf. Process., 2017
Privacy-preserving point-inclusion protocol for an arbitrary area based on phase-encoded quantum private query.
Quantum Inf. Process., 2017
Quantum Inf. Process., 2017
Int. J. Netw. Secur., 2017
2016
Quantum Inf. Process., 2016
基于编码和同态加密的高效SMP方案 (Efficient Solution to SMP Based on Coding and Homomorphic Encryption).
计算机科学, 2016
KSII Trans. Internet Inf. Syst., 2016
Quantum private set intersection cardinality and its application to anonymous authentication.
Inf. Sci., 2016
Int. J. Secur. Networks, 2016
Int. J. Electron. Secur. Digit. Forensics, 2016
Efficient Authenticated Key Exchange Protocols for Large-Scale Mobile Communication Networks.
Proceedings of the Cloud Computing, Security, Privacy in New Computing Environments, 2016
2015
Comments on two schemes of identity-based user authentication and key agreement for mobile client-server networks.
J. Supercomput., 2015
Secur. Commun. Networks, 2015
An Efficient SDN Load Balancing Scheme Based on Variance Analysis for Massive Mobile Users.
Mob. Inf. Syst., 2015
J. Inf. Hiding Multim. Signal Process., 2015
Int. J. Electron. Secur. Digit. Forensics, 2015
2014
Trans. Emerg. Telecommun. Technol., 2014
2013
Erratum to: Multi-party quantum key agreement with Bell states and Bell measurements.
Quantum Inf. Process., 2013
Quantum Inf. Process., 2013
2012
Quantum Inf. Process., 2012
Proceedings of the Eighth International Conference on Natural Computation, 2012
Proceedings of the 9th International Conference on Fuzzy Systems and Knowledge Discovery, 2012
2011
Quantum Inf. Process., 2011
Quantum Inf. Process., 2011
An Efficient Multiparty Quantum Secret Sharing with Pure Entangled Two Photon States.
Proceedings of the Advances in Computer Science, Environment, Ecoinformatics, and Education, 2011
2010
Proceedings of the International Conference on E-Business and E-Government, 2010
2008
Proceedings of the International Workshop on Knowledge Discovery and Data Mining, 2008
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2008
2007
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007
2005
Two New Fast Methods for Simultaneous Scalar Multiplication in Elliptic Curve Cryptosystems.
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005