Shuang-Gen Liu

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Bibliography

2024
A Certificateless Threshold Proxy Re-Encrypted Data-Sharing Scheme With Cloud-Chain Collaboration in Industrial Internet Environments.
IEEE Internet Things J., October, 2024

Secure Data Sharing in V2N Based on a Privacy-Preserving Identify-Based Broadcast Proxy Re-Encryption Plus Scheme.
IEEE Netw., May, 2024

Efficient Certificateless Blind Signature Scheme With Conditional Revocation for Mobile Crowdsensing Within Smart City.
IEEE Internet Things J., May, 2024

A traceable and revocable broadcast encryption scheme for preventing malicious encryptors in Medical IoT.
J. Syst. Archit., 2024

Puncturable-based broadcast encryption with tracking for preventing malicious encryptors in cloud file sharing.
J. Inf. Secur. Appl., 2024

Selective privacy-preserving framework for large language models fine-tuning.
Inf. Sci., 2024

A secure certificateless ring signcryption scheme based on SM2 algorithm in smart grid.
Comput. Commun., 2024

2023
A certificate-based proxy re-encryption plus scheme for secure medical data sharing.
Internet Things, October, 2023

A certificateless multi-dimensional data aggregation scheme for smart grid.
J. Syst. Archit., 2023

Strict Differentially Private Support Vector Machines with Dimensionality Reduction.
Proceedings of the Artificial Intelligence Security and Privacy, 2023

2022
A power resource dispatching framework with a privacy protection function in the Power Internet of Things.
Frontiers Inf. Technol. Electron. Eng., 2022

Secure and efficient two-party collaborative SM9 signature scheme suitable for smart home.
J. King Saud Univ. Comput. Inf. Sci., 2022

2021
Efficient Septuple Formula for Elliptic Curve and Efficient Scalar Multiplication Using a Triple-Base Chain Representation.
IEEE Access, 2021

Secure Threshold Ring Signature Based on SM9.
IEEE Access, 2021

An Efficient Double Parameter Elliptic Curve Digital Signature Algorithm for Blockchain.
IEEE Access, 2021

2020
Fast Scalar Multiplication Algorithm Based on Co_Z Operations on Elliptic Curves over GF(3^m).
Int. J. Netw. Secur., 2020

2019
SPA Resistant Scalar Multiplication Using Pell Lucas Type Chain.
Int. J. Netw. Secur., 2019

An Improved Ternary Montgomery Ladder Algorithm on Elliptic Curves over GF(3^m).
Int. J. Netw. Secur., 2019

SPA Resistant Balanced Ternary Segmented Scalar Multiplication.
Int. J. Netw. Secur., 2019

2018
A Fast Scalar Multiplication Algorithm Based on Alternate-Zeckendorf Representation.
Int. J. Netw. Secur., 2018

Fast elliptic curve algorithm using deformed Fibonacci-type series.
Int. J. Embed. Syst., 2018

Fast elliptic curve scalar multiplication for resisting against SPA.
Int. J. Comput. Sci. Eng., 2018

2015
SPA Resistant Scalar Multiplication Based on Addition and Tripling Indistinguishable on Elliptic Curve Cryptosystem.
Proceedings of the 10th International Conference on P2P, 2015

Fast and Secure Elliptic Curve Scalar Multiplication Algorithm Based on a Kind of Deformed Fibonacci-Type Series.
Proceedings of the 10th International Conference on P2P, 2015

2009
An efficient implementation algorithm for generating de Bruijn sequences.
Comput. Stand. Interfaces, 2009

2006
Efficient and Provably Secure Multi-Recipient Signcryption from Bilinear Pairings.
IACR Cryptol. ePrint Arch., 2006

ID-Based ( <i>t</i> , <i>n</i> ) Threshold Proxy Signcryption for Multi-agent Systems.
Proceedings of the Computational Intelligence and Security, International Conference, 2006


  Loading...