Shuang-Gen Liu
This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.
Bibliography
2024
A Certificateless Threshold Proxy Re-Encrypted Data-Sharing Scheme With Cloud-Chain Collaboration in Industrial Internet Environments.
IEEE Internet Things J., October, 2024
Secure Data Sharing in V2N Based on a Privacy-Preserving Identify-Based Broadcast Proxy Re-Encryption Plus Scheme.
IEEE Netw., May, 2024
Efficient Certificateless Blind Signature Scheme With Conditional Revocation for Mobile Crowdsensing Within Smart City.
IEEE Internet Things J., May, 2024
A traceable and revocable broadcast encryption scheme for preventing malicious encryptors in Medical IoT.
J. Syst. Archit., 2024
Puncturable-based broadcast encryption with tracking for preventing malicious encryptors in cloud file sharing.
J. Inf. Secur. Appl., 2024
Inf. Sci., 2024
A secure certificateless ring signcryption scheme based on SM2 algorithm in smart grid.
Comput. Commun., 2024
2023
Internet Things, October, 2023
J. Syst. Archit., 2023
Proceedings of the Artificial Intelligence Security and Privacy, 2023
2022
A power resource dispatching framework with a privacy protection function in the Power Internet of Things.
Frontiers Inf. Technol. Electron. Eng., 2022
Secure and efficient two-party collaborative SM9 signature scheme suitable for smart home.
J. King Saud Univ. Comput. Inf. Sci., 2022
2021
Efficient Septuple Formula for Elliptic Curve and Efficient Scalar Multiplication Using a Triple-Base Chain Representation.
IEEE Access, 2021
An Efficient Double Parameter Elliptic Curve Digital Signature Algorithm for Blockchain.
IEEE Access, 2021
2020
Fast Scalar Multiplication Algorithm Based on Co_Z Operations on Elliptic Curves over GF(3^m).
Int. J. Netw. Secur., 2020
2019
Int. J. Netw. Secur., 2019
Int. J. Netw. Secur., 2019
Int. J. Netw. Secur., 2019
2018
Int. J. Netw. Secur., 2018
Int. J. Embed. Syst., 2018
Int. J. Comput. Sci. Eng., 2018
2015
SPA Resistant Scalar Multiplication Based on Addition and Tripling Indistinguishable on Elliptic Curve Cryptosystem.
Proceedings of the 10th International Conference on P2P, 2015
Fast and Secure Elliptic Curve Scalar Multiplication Algorithm Based on a Kind of Deformed Fibonacci-Type Series.
Proceedings of the 10th International Conference on P2P, 2015
2009
Comput. Stand. Interfaces, 2009
2006
IACR Cryptol. ePrint Arch., 2006
ID-Based ( <i>t</i> , <i>n</i> ) Threshold Proxy Signcryption for Multi-agent Systems.
Proceedings of the Computational Intelligence and Security, International Conference, 2006