Shengke Zeng
Orcid: 0000-0003-2004-9197
According to our database1,
Shengke Zeng
authored at least 41 papers
between 2000 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Peer Peer Netw. Appl., May, 2024
IEEE Trans. Serv. Comput., 2024
J. Ind. Inf. Integr., 2024
HT2REP: A fair cross-chain atomic exchange protocol under UC framework based on HTLCs and TRE.
Comput. Stand. Interfaces, 2024
2023
Inf. Sci., May, 2023
Dual-LightGCN: Dual light graph convolutional network for discriminative recommendation.
Comput. Commun., April, 2023
Privacy-Preserving Authentication Scheme With Revocability for Multi-WSN in Industrial IoT.
IEEE Syst. J., March, 2023
IACR Cryptol. ePrint Arch., 2023
Secure Single-Server Fuzzy Deduplication without Interactive Proof-of-Ownership in Cloud.
IACR Cryptol. ePrint Arch., 2023
Proceedings of the 2023 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2023
Proceedings of the IEEE International Conference on Communications, 2023
Proceedings of the Artificial Intelligence Security and Privacy, 2023
Proceedings of the Artificial Intelligence Security and Privacy, 2023
2022
Deniable-Based Privacy-Preserving Authentication Against Location Leakage in Edge Computing.
IEEE Syst. J., 2022
Peer-to-Peer Netw. Appl., 2022
IACR Cryptol. ePrint Arch., 2022
Proceedings of the 24th IEEE Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, 2022
Secure Single-Server Fuzzy Deduplication without Interactive Proof-of-Ownership in Cloud.
Proceedings of the 24th IEEE Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, 2022
2020
A practical and communication-efficient deniable authentication with source-hiding and its application on Wi-Fi privacy.
Inf. Sci., 2020
2019
A Blockchain-Based Privacy-Awareness Authentication Scheme With Efficient Revocation for Multi-Server Architectures.
IEEE Access, 2019
2018
Wirel. Pers. Commun., 2018
Concurrently Deniable Group Key Agreement and Its Application to Privacy-Preserving VANETs.
Wirel. Commun. Mob. Comput., 2018
2017
Peer-to-Peer Netw. Appl., 2017
Proceedings of the Provable Security, 2017
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017
2016
Secur. Commun. Networks, 2016
Proceedings of the 9th International Conference on Utility and Cloud Computing, 2016
(t, p)-Threshold point function secret sharing scheme based on polynomial interpolation and its application.
Proceedings of the 9th International Conference on Utility and Cloud Computing, 2016
2015
Privacy-preserving Communication for VANETs with Conditionally Anonymous Ring Signature.
Int. J. Netw. Secur., 2015
Blind Expressive Ciphertext Policy Attribute Based Encryption for Fine Grained Access Control on the Encrypted Data.
Int. J. Netw. Secur., 2015
Proceedings of the 10th International Conference on Information, 2015
2014
Int. J. Netw. Secur., 2014
2013
Int. J. Netw. Secur., 2013
2012
Theor. Comput. Sci., 2012
Proceedings of the Provable Security - 6th International Conference, 2012
2011
Informatica (Slovenia), 2011
Proceedings of the Computing and Combinatorics - 17th Annual International Conference, 2011
2008
Proceedings of the The Third International Conference on Availability, 2008
2005
Digital measurement of human proximity to electrical power circuit by a novel amplitude-shift-keying radio-frequency receiver.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2005), 2005
2000
IEEE Trans. Biomed. Eng., 2000