Shundong Li

Orcid: 0000-0002-2378-0092

According to our database1, Shundong Li authored at least 43 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Privacy-Preserving Any-Hop Cover Shortest Distance Queries on Encrypted Graphs.
IEEE Internet Things J., May, 2024

FPMRQ: Fully Privacy-Preserving Multidimensional Range Queries on Encrypted Data.
IEEE Internet Things J., April, 2024

2022
SPCS: Strong Privacy-Preserving-Constrained Shortest Distance Queries on Encrypted Graphs.
IEEE Internet Things J., 2022

2021
Multiple ant colony optimization using both novel LSTM network and adaptive Tanimoto communication strategy.
Appl. Intell., 2021

Privacy-Preserving Proximity Detection Framework for Location-Based Services.
Proceedings of the 2021 International Conference on Networking and Network Applications, 2021

2020
Privacy-preserving mixed set operations.
Inf. Sci., 2020

Polynomial AND homomorphic cryptosystem and applications.
Sci. China Inf. Sci., 2020

Multi-Colony Ant Algorithm Using Both Generative Adversarial Nets and Adaptive Stagnation Avoidance Strategy.
IEEE Access, 2020

2019
Privacy-preserving Computational Geometry.
Int. J. Netw. Secur., 2019

Probabilistic RSA with Homomorphism and Its Applications.
Int. J. Netw. Secur., 2019

Using Transposition Padding to Get CCA2 Security From Any Deterministic Encryption Schemes.
IEEE Access, 2019

2018
An Efficient Protocol for Privately Determining the Relationship Between Two Straight Lines.
Int. J. Netw. Secur., 2018

Secure "Ratio" Computation and Efficient Protocol for General Secure Two-Party Comparison.
IEEE Access, 2018

2017
Efficient Secure Multiparty Subset Computation.
Secur. Commun. Networks, 2017

Efficient Solutions to Two-Party and Multiparty Millionaires' Problem.
Secur. Commun. Networks, 2017

Optimal impulsive harvesting policies for single-species populations.
Appl. Math. Comput., 2017

2016
A homomorphic encryption scheme with adaptive chosen ciphertext security but without random oracle.
Theor. Comput. Sci., 2016

Efficient private subset computation.
Secur. Commun. Networks, 2016

A Joint Random Secret Sharing Scheme with Public Verifiability.
Int. J. Netw. Secur., 2016

Deterministic cloned tag detection protocol for anonymous radio-frequency identification systems.
IET Inf. Secur., 2016

A restricted proxy re-encryption with keyword search for fine-grained data access control in cloud storage.
Concurr. Comput. Pract. Exp., 2016

2015
A cheater identifiable multi-secret sharing scheme based on the Chinese remainder theorem.
Secur. Commun. Networks, 2015

A distributed secret share update scheme with public verifiability for ad hoc network.
Secur. Commun. Networks, 2015

一个标准模型下的匿名IBE方案 (Anonymous Identity-based Encryption without Random Oracles).
计算机科学, 2015

基本初等函数的保密云计算服务协议 (Secure Cloud Computing Service Protocols of Elementary Functions).
计算机科学, 2015

Key management scheme based on secret sharing for wireless sensor networks.
Int. J. Inf. Commun. Technol., 2015

2014
Secure multiparty computation of solid geometric problems and their applications.
Inf. Sci., 2014

Comments on FHH Anonymous Multireceiver Encryption.
Int. J. Netw. Secur., 2014

A Limited Proxy Re-encryption with Keyword Search for Data Access Control in Cloud Computing.
Proceedings of the Network and System Security - 8th International Conference, 2014

E-Commerce Strategy
Springer, ISBN: 978-3-642-39414-0, 2014

2013
A transcoding-resistant video watermarking algorithm based on corners and singular value decomposition.
Telecommun. Syst., 2013

An Anti-cheating Block Secret Sharing Scheme Based on Cyclic Codes.
Proceedings of the Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2013

Key Management Scheme Based on Secret Sharing for Wireless Sensor Network.
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013

2012
Two Constructions of Multireceiver Encryption Supporting Constant Keys, Short Ciphertexts, and Identity Privacy.
Int. J. Netw. Secur., 2012

(2, n) secret sharing scheme for gray and color images based on Boolean operation.
Sci. China Inf. Sci., 2012

Conjunctive Keywords Searchable Encryption with Efficient Pairing, Constant Ciphertext and Short Trapdoor.
Proceedings of the Intelligence and Security Informatics - Pacific Asia Workshop, 2012

2009
Secure Signature Protocol.
Intell. Inf. Manag., 2009

Symmetric cryptographic protocols for extended millionaires' problem.
Sci. China Ser. F Inf. Sci., 2009

2008
Symmetric cryptographic solution to Yao's millionaires' problem and an evaluation of secure multiparty computations.
Inf. Sci., 2008

Comparing two sets without disclosing them.
Sci. China Ser. F Inf. Sci., 2008

2007
New Efficient Non-malleable Commitment Schemes.
Proceedings of The Sixth International Conference on Advanced Language Processing and Web Information Technology, 2007

2006
Symmetric Encryption Solutions to Millionaire's Problem and Its Extension.
Proceedings of the First IEEE International Conference on Digital Information Management (ICDIM), 2006

2005
Secure Two-Party Computational Geometry.
J. Comput. Sci. Technol., 2005


  Loading...