Zhenfeng Zhang
Orcid: 0000-0002-0712-6648
According to our database1,
Zhenfeng Zhang
authored at least 162 papers
between 2002 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
2005
2010
2015
2020
0
5
10
15
20
9
9
6
9
9
12
4
6
6
5
2
2
5
1
2
1
1
3
2
1
1
1
2
2
5
8
5
3
8
4
4
3
4
4
2
1
2
5
2
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Frontiers Comput. Sci., August, 2024
BSRA: Blockchain-Based Secure Remote Authentication Scheme for Fog-Enabled Internet of Things.
IEEE Internet Things J., January, 2024
Comput. J., January, 2024
IEEE Trans. Dependable Secur. Comput., 2024
Resilience-Optimal Lightweight High-threshold Asynchronous Verifiable Secret Sharing.
IACR Cryptol. ePrint Arch., 2024
MPC-in-the-Head Framework without Repetition and its Applications to the Lattice-based Cryptography.
IACR Cryptol. ePrint Arch., 2024
Comput. J., 2024
2023
IET Inf. Secur., July, 2023
Illu-NASNet: unsupervised illumination estimation based on dense spatio-temporal smoothness.
Multim. Syst., June, 2023
IEEE Trans. Inf. Forensics Secur., 2023
IEEE Trans. Inf. Forensics Secur., 2023
Escaping From Consensus: Instantly Redactable Blockchain Protocols in Permissionless Setting.
IEEE Trans. Dependable Secur. Comput., 2023
Post-Quantum Security of Key Encapsulation Mechanism against CCA Attacks with a Single Decapsulation Query.
IACR Cryptol. ePrint Arch., 2023
Proceedings of the Selected Areas in Cryptography - SAC 2023, 2023
2022
Anonymous Authenticated Key Agreement and Group Proof Protocol for Wearable Computing.
IEEE Trans. Mob. Comput., 2022
IACR Cryptol. ePrint Arch., 2022
LMS-SM3 and HSS-SM3: Instantiating Hash-based Post-Quantum Signature Schemes with SM3.
IACR Cryptol. ePrint Arch., 2022
Lattice Reduction Meets Key-Mismatch: New Misuse Attack on Lattice-Based NIST Candidate KEMs.
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
Comput. Networks, 2022
Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
IEEE Trans. Inf. Forensics Secur., 2021
IEEE Trans. Dependable Secur. Comput., 2021
IEEE Syst. J., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
CoRR, 2021
Comput. Secur., 2021
PAMSGAN: Pyramid Attention Mechanism-Oriented Symmetry Generative Adversarial Network for Motion Image Deblurring.
IEEE Access, 2021
Proceedings of the 30th USENIX Security Symposium, 2021
Fooling an Unbounded Adversary with a Short Key, Repeatedly: The Honey Encryption Perspective.
Proceedings of the 2nd Conference on Information-Theoretic Cryptography, 2021
2020
Correction to: Revisiting the Security of Qian et al.'s Revised Tree-$\hbox {LSHB}^+$ Protocol.
Wirel. Pers. Commun., 2020
IEEE Trans. Inf. Forensics Secur., 2020
IACR Cryptol. ePrint Arch., 2020
Corrigendum to "Optiwords: A new password policy for creating memorable and strong password" [Computers & Security, Volume 85, 2019, Pages 423-435].
Comput. Secur., 2020
Corrigendum to "LPSE: Lightweight password-strength estimation for password meters" [Computers & Security, Volume 73, 2018, Pages 507-518].
Comput. Secur., 2020
Corrigendum to "Breaking the binding: Attacks on the Merkle approach to prove liabilities and its applications" [Computers & Security, Volume 87, 2019, 101585].
Comput. Secur., 2020
Comput. Secur., 2020
Sci. China Inf. Sci., 2020
Proceedings of the Provable and Practical Security - 14th International Conference, ProvSec 2020, Singapore, November 29, 2020
Proceedings of the Provable and Practical Security - 14th International Conference, ProvSec 2020, Singapore, November 29, 2020
Strong Authentication without Temper-Resistant Hardware and Application to Federated Identities.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020
Siamese neural networks for the classification of high-dimensional radiomic features.
Proceedings of the Medical Imaging 2020: Computer-Aided Diagnosis, 2020
Proceedings of the IEEE European Symposium on Security and Privacy, 2020
Springer, ISBN: 978-981-15-8426-8, 2020
2019
Revisiting the Security of Qian et al.'s Revised Tree- $$\hbox {LSHB}^+$$ LSHB + Protocol.
Wirel. Pers. Commun., 2019
Investigating the Multi-Ciphersuite and Backwards-Compatibility Security of the Upcoming TLS 1.3.
IEEE Trans. Dependable Secur. Comput., 2019
IACR Cryptol. ePrint Arch., 2019
Tweaking the Asymmetry of Asymmetric-Key Cryptography on Lattices: KEMs and Signatures of Smaller Sizes.
IACR Cryptol. ePrint Arch., 2019
On the non-tightness of measurement-based reductions for key encapsulation mechanism in the quantum random oracle model.
IACR Cryptol. ePrint Arch., 2019
Tighter security proofs for generic key encapsulation mechanism in the quantum random oracle model.
IACR Cryptol. ePrint Arch., 2019
Key Encapsulation Mechanism with Explicit Rejection in the Quantum Random Oracle Model.
IACR Cryptol. ePrint Arch., 2019
CoRR, 2019
Breaking the binding: Attacks on the Merkle approach to prove liabilities and its applications.
Comput. Secur., 2019
Comput. Secur., 2019
Channel Allocation and Power Control for Device-to-Device Communications Underlaying Cellular Networks Incorporated With Non-Orthogonal Multiple Access.
IEEE Access, 2019
A Convolutional Neural Network based Resource Management Algorithm for NOMA enhanced D2D and Cellular Hybrid Networks.
Proceedings of the 11th International Conference on Wireless Communications and Signal Processing, 2019
User Connectivity Maximization for D2D and Cellular Hybrid Networks with Non-Orthogonal Multiple Access.
Proceedings of the 30th IEEE Annual International Symposium on Personal, 2019
A semiautomatic approach for prostate segmentation in MR images using local texture classification and statistical shape modeling.
Proceedings of the Medical Imaging 2019: Image-Guided Procedures, 2019
Radiomics analysis of MRI for predicting molecular subtypes of breast cancer in young women.
Proceedings of the Medical Imaging 2019: Computer-Aided Diagnosis, San Diego, 2019
Deep Neural Network based Channel Allocation for Interference-Limited Wireless Networks.
Proceedings of the 20th IEEE International Conference on High Performance Switching and Routing, 2019
Proceedings of the 20th IEEE International Conference on High Performance Switching and Routing, 2019
Generic Traceable Proxy Re-encryption and Accountable Extension in Consensus Network.
Proceedings of the Computer Security - ESORICS 2019, 2019
Proceedings of the 13th IEEE International Conference on ASIC, 2019
2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
Comput. Secur., 2018
Proceedings of the 17th IEEE International Conference On Trust, 2018
A Channel Estimation Method Based on the Improved LMS Algorithm for MIMO-OFDM Systems.
Proceedings of the 12th International Symposium on Medical Information and Communication Technology, 2018
Proceedings of the IoT as a Service - 4th EAI International Conference, 2018
IND-CCA-Secure Key Encapsulation Mechanism in the Quantum Random Oracle Model, Revisited.
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018
2017
Wirel. Pers. Commun., 2017
IEEE Trans. Mob. Comput., 2017
IEEE Commun. Lett., 2017
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
Sci. China Inf. Sci., 2017
Bootstrapping Fully Homomorphic Encryption with Ring Plaintexts Within Polynomial Noise.
Proceedings of the Provable Security, 2017
Proceedings of the Information and Communications Security - 19th International Conference, 2017
Proceedings of the Database Systems for Advanced Applications, 2017
2016
IEEE Trans. Medical Imaging, 2016
Secur. Commun. Networks, 2016
Programmable Hash Functions from Lattices: Short Signatures and IBEs with Small Key Sizes.
IACR Cryptol. ePrint Arch., 2016
AEP-M: Practical Anonymous E-Payment for Mobile Devices using ARM TrustZone and Divisible E-Cash (Full Version).
IACR Cryptol. ePrint Arch., 2016
Security analysis of a privacy-preserving decentralized ciphertext-policy attribute-based encryption scheme.
Concurr. Comput. Pract. Exp., 2016
Proceedings of the IEEE Symposium on Security and Privacy, 2016
Capillary number effect on the depletion of leucocytes of blood in microfiltration chips for the isolation of circulating tumor cells.
Proceedings of the 11th IEEE Annual International Conference on Nano/Micro Engineered and Molecular Systems, 2016
AEP-M: Practical Anonymous E-Payment for Mobile Devices Using ARM TrustZone and Divisible E-Cash.
Proceedings of the Information Security - 19th International Conference, 2016
Proceedings of the Progress in Cryptology - INDOCRYPT 2016, 2016
Proceedings of the Information Security and Cryptology - ICISC 2016 - 19th International Conference, Seoul, South Korea, November 30, 2016
Proceedings of the Information Security and Cryptology - 12th International Conference, 2016
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
Practical Anonymous Password Authentication and TLS with Anonymous Client Authentication.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
2015
Universally composable three-party password-authenticated key exchange with contributiveness.
Int. J. Commun. Syst., 2015
IACR Cryptol. ePrint Arch., 2015
Proceedings of the Web Information Systems Engineering - WISE 2015, 2015
Proceedings of the Security Standardisation Research - Second International Conference, 2015
Proceedings of the Advances in Cryptology - EUROCRYPT 2015, 2015
Proceedings of the Applied Cryptography and Network Security, 2015
2014
PRE: Stronger security notions and efficient construction with non-interactive opening.
Theor. Comput. Sci., 2014
Proceedings of the Trust and Trustworthy Computing - 7th International Conference, 2014
Security Analysis of EMV Channel Establishment Protocol in An Enhanced Security Model.
Proceedings of the Information and Communications Security - 16th International Conference, 2014
Proceedings of the Cryptology and Network Security - 13th International Conference, 2014
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014
2013
Security Analysis of a Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption Scheme.
IEEE Trans. Parallel Distributed Syst., 2013
Analysis and Enhancement of an Optimized Gateway-Oriented Password-Based Authenticated Key Exchange Protocol.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013
Proceedings of the Provable Security - 7th International Conference, 2013
Proceedings of the Information Security and Cryptology - ICISC 2013, 2013
Fully Secure Attribute-Based Systems with Short Ciphertexts/Signatures and Threshold Access Structures.
Proceedings of the Topics in Cryptology - CT-RSA 2013, 2013
2012
Corrigendum to "Gateway-oriented password-authenticated key exchange protocol in the standard model" [J. Syst. Softw. 85 (March (3)) (2012) 760-768].
J. Syst. Softw., 2012
J. Syst. Softw., 2012
IET Inf. Secur., 2012
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
Proceedings of the Provable Security - 6th International Conference, 2012
Proceedings of the Provable Security - 6th International Conference, 2012
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012
Threshold Ciphertext Policy Attribute-Based Encryption with Constant Size Ciphertexts.
Proceedings of the Information Security and Privacy - 17th Australasian Conference, 2012
2011
IACR Cryptol. ePrint Arch., 2011
Gateway-Oriented Password-Authenticated Key Exchange Protocol with Stronger Security.
Proceedings of the Provable Security - 5th International Conference, 2011
Efficient Ciphertext Policy Attribute-Based Encryption with Constant-Size Ciphertext and Constant Computation-Cost.
Proceedings of the Provable Security - 5th International Conference, 2011
Proceedings of the Information Security and Cryptology - 7th International Conference, 2011
A Generic Construction from Selective-IBE to Public-Key Encryption with Non-interactive Opening.
Proceedings of the Information Security and Cryptology - 7th International Conference, 2011
2010
Collusion Attack on a Self-healing Key Distribution with Revocation in Wireless Sensor Networks.
Proceedings of the Information Security Applications - 11th International Workshop, 2010
Proceedings of the Global Communications Conference, 2010
2009
The generalized Mandelbrot set perturbed by composing noise of additive and multiplicative.
Appl. Math. Comput., 2009
2008
Proceedings of the Progress in Cryptology, 2008
2007
Certificateless signature: a new security model and an improved generic construction.
Des. Codes Cryptogr., 2007
2006
IACR Cryptol. ePrint Arch., 2006
Proceedings of the Applied Cryptography and Network Security, 4th International Conference, 2006
Proceedings of the Information Security and Privacy, 11th Australasian Conference, 2006
2005
Cryptanalysis of the end-to-end security for mobile communications with end-user identification/authentication.
IEEE Commun. Lett., 2005
IACR Cryptol. ePrint Arch., 2005
Appl. Math. Comput., 2005
Proceedings of the Applied Public Key Infrastructure, 2005
Proceedings of the Parallel and Distributed Processing and Applications, 2005
Proceedings of the Information and Communications Security, 7th International Conference, 2005
Proceedings of the Cryptology and Network Security, 4th International Conference, 2005
Proceedings of the Cryptology and Network Security, 4th International Conference, 2005
2004
Proceedings of the Information Security Applications, 5th International Workshop, 2004
A New CEMBS Based on RSA Signatures and Its Application in Constructing Fair Exchange Protocol.
Proceedings of the 2004 IEEE International Conference on e-Technology, 2004
2003
IACR Cryptol. ePrint Arch., 2003
2002
Sci. China Ser. F Inf. Sci., 2002