Zhe Xia
Orcid: 0000-0003-4397-1248
According to our database1,
Zhe Xia
authored at least 98 papers
between 2007 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Lightweight ring-neighbor-based user authentication and group-key agreement for internet of drones.
Cybersecur., December, 2024
IEEE Trans. Veh. Technol., September, 2024
An Anonymous and Efficient Certificate-Based Identity Authentication Protocol for VANET.
IEEE Internet Things J., April, 2024
IEEE Internet Things J., April, 2024
J. Syst. Archit., February, 2024
PRLAP-IoD: A PUF-based Robust and Lightweight Authentication Protocol for Internet of Drones.
Comput. Networks, January, 2024
Extremely Lightweight Constant-Round Membership-Authenticated Group Key Establishment for Resource-Constrained Smart Environments toward 5G.
Comput. J., 2024
2023
An Efficient Certificateless Signature Scheme With Provably Security and Its Applications.
IEEE Syst. J., December, 2023
Ideal dynamic threshold Multi-secret data sharing in smart environments for sustainable cities.
Inf. Sci., November, 2023
Des. Codes Cryptogr., November, 2023
J. Inf. Secur. Appl., September, 2023
IEEE Internet Things J., June, 2023
Fast and Lightweight Authenticated Group Key Agreement Realizing Privacy Protection for Resource-Constrained IoMT.
Wirel. Pers. Commun., April, 2023
A verifiable and privacy-preserving cloud mining pool selection scheme in blockchain of things.
Inf. Sci., April, 2023
Quorum controlled homomorphic re-encryption for privacy preserving computations in the cloud.
Inf. Sci., April, 2023
An Efficient Identity Authentication Scheme With Provable Security and Anonymity for Mobile Edge Computing.
IEEE Syst. J., March, 2023
An Efficient Certificate-Based Aggregate Signature Scheme With Provable Security for Industrial Internet of Things.
IEEE Syst. J., March, 2023
Comments on 'Chinese Remainder Theorem-based centralised group key management for secure multicast communication'.
IET Inf. Secur., March, 2023
Construction of Lightweight Authenticated Joint Arithmetic Computation for 5G IoT Networks.
Comput. J., January, 2023
A Privacy-Preserving and Verifiable Statistical Analysis Scheme for an E-Commerce Platform.
IEEE Trans. Inf. Forensics Secur., 2023
Inf. Process. Lett., 2023
An Anonymous and Efficient Multimessage and Multireceiver Certificateless Signcryption Scheme for VANET.
IEEE Internet Things J., 2023
A direct construction of continuous leakage-resilient (H)IBE scheme with CCA security from dual system encryption.
Comput. Stand. Interfaces, 2023
Proceedings of the Machine Learning for Cyber Security - 5th International Conference, 2023
Blockchain-Based Hierarchical Access Control with Efficient Revocation in mHealth System.
Proceedings of the Blockchain Technology and Emerging Applications, 2023
Verifiable Attribute-Based Proxy Re-encryption with Non-repudiation Based on Blockchain.
Proceedings of the Blockchain Technology and Emerging Applications, 2023
OWETC: Open world encrypted traffic classification based on semi-supervised class incremental learning.
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2023
2022
General logic-operation-based lightweight group-key distribution schemes for Internet of Vehicles.
Veh. Commun., 2022
Secure and Efficient Certificate-Based Proxy Signature Schemes for Industrial Internet of Things.
IEEE Syst. J., 2022
Information-theoretic secure rational secret sharing in asynchronous networks for untrusted cloud environments.
J. Cloud Comput., 2022
A distributed privacy-preserving data aggregation scheme for smart grid with fine-grained access control.
J. Inf. Secur. Appl., 2022
Proceedings of the 22nd IEEE International Conference on Software Quality, 2022
A Multi-task Mobile Crowdsensing Scheme with Conditional Privacy Preserving for Vehicle Networks.
Proceedings of the Emerging Information Security and Applications, 2022
2021
Wirel. Networks, 2021
PPO-DFK: A Privacy-Preserving Optimization of Distributed Fractional Knapsack With Application in Secure Footballer Configurations.
IEEE Syst. J., 2021
Non-interactive secure multi-party arithmetic computations with confidentiality for P2P networks.
Peer-to-Peer Netw. Appl., 2021
Design of ideal secret sharing based on new results on representable quadripartite matroids.
J. Inf. Secur. Appl., 2021
Non-interactive integrated membership authentication and group arithmetic computation output for 5G sensor networks.
IET Commun., 2021
IACR Cryptol. ePrint Arch., 2021
Des. Codes Cryptogr., 2021
Proceedings of the ICCCV 2021: 4th International Conference on Control and Computer Vision, Macau, SAR, China, August 13, 2021
A Federated Learning Assisted Conditional Privacy Preserving Scheme for Vehicle Networks.
Proceedings of the Cyberspace Safety and Security - 13th International Symposium, 2021
2020
Theor. Comput. Sci., 2020
Cryptanalysis and Improvement of a Group Authentication Scheme with Multiple Trials and Multiple Authentications.
Secur. Commun. Networks, 2020
An efficient aggregation scheme resisting on malicious data mining attacks for smart grid.
Inf. Sci., 2020
Inf. Process. Lett., 2020
Int. J. Found. Comput. Sci., 2020
IET Commun., 2020
Continuous Leakage-Resilient Certificate-Based Encryption Scheme Without Bilinear Pairings.
Comput. J., 2020
Non-Interactive Dealer-Free Dynamic Threshold Secret Sharing Based on Standard Shamir's SS for 5G Networks.
IEEE Access, 2020
Fast Multivariate-Polynomial-Based Membership Authentication and Key Establishment for Secure Group Communications in WSN.
IEEE Access, 2020
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2020
Domain Adaptation Based Person-Specific Face Anti-spoofing Using Color Texture Features.
Proceedings of the ICMLT 2020: 5th International Conference on Machine Learning Technologies, 2020
Proceedings of the Information Security and Privacy - 25th Australasian Conference, 2020
2019
An Information Theoretically Secure E-Lottery Scheme Based on Symmetric Bivariate Polynomials.
Symmetry, 2019
Soft Comput., 2019
A secure data sharing scheme with cheating detection based on Chaum-Pedersen protocol for cloud storage.
Frontiers Inf. Technol. Electron. Eng., 2019
Novel Identity-Based Hash Proof System with Compact Master Public Key from Lattices in the Standard Model.
Int. J. Found. Comput. Sci., 2019
Comput. Networks, 2019
Development of an Early Warning System for Network Intrusion Detection Using Benford's Law Features.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2019
Proceedings of the Provable Security, 2019
Proceedings of the Network and System Security - 13th International Conference, 2019
Proceedings of the Information and Communications Security - 21st International Conference, 2019
Proceedings of the 2nd International ACM Workshop on Security and Privacy for the Internet-of-Things, 2019
2018
Secur. Commun. Networks, 2018
Updatable Identity-Based Hash Proof System Based on Lattices and Its Application to Leakage-Resilient Public-Key Encryption Schemes.
J. Comput. Sci. Technol., 2018
Ad Hoc Networks, 2018
Consecutive Leakage-Resilient and Updatable Lossy Trapdoor Functions and Application in Sensitive Big-Data Environments.
IEEE Access, 2018
Proceedings of the Information Security Practice and Experience, 2018
Proceedings of the Information Security Practice and Experience, 2018
Verifiable Secret Sharing Based on Hyperplane Geometry with Its Applications to Optimal Resilient Proactive Cryptosystems.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018
2017
Detection and classification of malicious patterns in network traffic using Benford's law.
Proceedings of the 2017 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2017
2016
KSII Trans. Internet Inf. Syst., 2016
J. Inf. Secur. Appl., 2016
IEEE Access, 2016
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
2014
Proceedings of the Network and System Security - 8th International Conference, 2014
2013
Proceedings of the 2013 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2013
Proceedings of the Security Engineering and Intelligence Informatics, 2013
2012
Proceedings of the 2012 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2012
Proceedings of the 5th International Conference on Electronic Voting 2012, 2012
2011
Proceedings of the E-Voting and Identity - Third International Conference, 2011
Proceedings of the 2011 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2011
Proceedings of the 2011 International Workshop on Requirements Engineering for Electronic Voting Systems, 2011
2010
Proceedings of the Progress in Cryptology - INDOCRYPT 2010, 2010
2009
IEEE Trans. Inf. Forensics Secur., 2009
Proceedings of the First International Workshop on Requirements Engineering for e-Voting Systems, 2009
2008
Proceedings of the 2008 USENIX/ACCURATE Electronic Voting Workshop, 2008
2007
Proceedings of the E-Voting and Identity, First International Conference, 2007