Shundong Li
Orcid: 0000-0002-2378-0092
According to our database1,
Shundong Li
authored at least 43 papers
between 2005 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
IEEE Internet Things J., May, 2024
IEEE Internet Things J., April, 2024
2022
SPCS: Strong Privacy-Preserving-Constrained Shortest Distance Queries on Encrypted Graphs.
IEEE Internet Things J., 2022
2021
Multiple ant colony optimization using both novel LSTM network and adaptive Tanimoto communication strategy.
Appl. Intell., 2021
Proceedings of the 2021 International Conference on Networking and Network Applications, 2021
2020
Multi-Colony Ant Algorithm Using Both Generative Adversarial Nets and Adaptive Stagnation Avoidance Strategy.
IEEE Access, 2020
2019
Using Transposition Padding to Get CCA2 Security From Any Deterministic Encryption Schemes.
IEEE Access, 2019
2018
An Efficient Protocol for Privately Determining the Relationship Between Two Straight Lines.
Int. J. Netw. Secur., 2018
Secure "Ratio" Computation and Efficient Protocol for General Secure Two-Party Comparison.
IEEE Access, 2018
2017
Secur. Commun. Networks, 2017
Appl. Math. Comput., 2017
2016
A homomorphic encryption scheme with adaptive chosen ciphertext security but without random oracle.
Theor. Comput. Sci., 2016
Int. J. Netw. Secur., 2016
Deterministic cloned tag detection protocol for anonymous radio-frequency identification systems.
IET Inf. Secur., 2016
A restricted proxy re-encryption with keyword search for fine-grained data access control in cloud storage.
Concurr. Comput. Pract. Exp., 2016
2015
A cheater identifiable multi-secret sharing scheme based on the Chinese remainder theorem.
Secur. Commun. Networks, 2015
A distributed secret share update scheme with public verifiability for ad hoc network.
Secur. Commun. Networks, 2015
计算机科学, 2015
计算机科学, 2015
Int. J. Inf. Commun. Technol., 2015
2014
Inf. Sci., 2014
A Limited Proxy Re-encryption with Keyword Search for Data Access Control in Cloud Computing.
Proceedings of the Network and System Security - 8th International Conference, 2014
2013
A transcoding-resistant video watermarking algorithm based on corners and singular value decomposition.
Telecommun. Syst., 2013
Proceedings of the Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2013
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013
2012
Two Constructions of Multireceiver Encryption Supporting Constant Keys, Short Ciphertexts, and Identity Privacy.
Int. J. Netw. Secur., 2012
Sci. China Inf. Sci., 2012
Conjunctive Keywords Searchable Encryption with Efficient Pairing, Constant Ciphertext and Short Trapdoor.
Proceedings of the Intelligence and Security Informatics - Pacific Asia Workshop, 2012
2009
Sci. China Ser. F Inf. Sci., 2009
2008
Symmetric cryptographic solution to Yao's millionaires' problem and an evaluation of secure multiparty computations.
Inf. Sci., 2008
2007
Proceedings of The Sixth International Conference on Advanced Language Processing and Web Information Technology, 2007
2006
Proceedings of the First IEEE International Conference on Digital Information Management (ICDIM), 2006
2005