Wei Zhang

Affiliations:
  • Engineering University of People's Armed Police, College of Cryptography Engineering, Key Laboratory of Network & Information Security under the People's Armed Police, Xi'an, China


According to our database1, Wei Zhang authored at least 13 papers between 2004 and 2019.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2019
Power Consumption Attack Based on Improved Principal Component Analysis.
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2019

2018
Faster Bootstrapping With Multiple Addends.
IEEE Access, 2018

Phishing Detection Research Based on PSO-BP Neural Network.
Proceedings of the Advances in Internet, 2018

Homomorphic Authentication Based on Rank-Based Merkle Hash Tree.
Proceedings of the Advances in Internet, 2018

Network Malicious Behavior Detection Using Bidirectional LSTM.
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2018

2017
Faster Bootstrapping with Multiple Addends.
IACR Cryptol. ePrint Arch., 2017

Outsourcing the Decryption of Ciphertexts for Predicate Encryption via Pallier Paradigm.
Proceedings of the Advances in Internetworking, 2017

2016
Efficient fully homomorphic encryption with circularly secure key switching process.
Int. J. High Perform. Comput. Netw., 2016

2015
How to build a faster private information retrieval protocol?
J. Ambient Intell. Humaniz. Comput., 2015

2013
Multi-bit homomorphic encryption based on learning with errors over rings.
IACR Cryptol. ePrint Arch., 2013

RLWE-Based Homomorphic Encryption and Private Information Retrieval.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

2009
A High-efficiency Data Distribution Algorithm in Distributed Storage.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2004
New multi-signature and proxy multi-signature schemes from the Weil pairings.
Proceedings of the 3rd International Conference on Information Security, 2004


  Loading...