Zhenfu Cao
Orcid: 0000-0002-5250-5030Affiliations:
- East China Normal University, Shanghai, China
According to our database1,
Zhenfu Cao
authored at least 389 papers
between 2003 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on orcid.org
On csauthors.net:
Bibliography
2024
Efficient and Privacy-Preserving Cloud-Assisted Two-Party Computation Scheme in Heterogeneous Networks.
IEEE Trans. Ind. Informatics, May, 2024
OpenSE: Efficient Verifiable Searchable Encryption With Access and Search Pattern Hidden for Cloud-IoT.
IEEE Internet Things J., April, 2024
Survey on Secure Keyword Search over Outsourced Data: From Cloud to Blockchain-assisted Architecture.
ACM Comput. Surv., March, 2024
Frontiers Comput. Sci., February, 2024
IEEE Trans. Serv. Comput., 2024
IEEE Trans. Serv. Comput., 2024
Hardware Secure Module Based Lightweight Conditional Privacy-Preserving Authentication for VANETs.
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
Collusion-Resilient and Maliciously Secure Cloud- Assisted Two-Party Computation Scheme in Mobile Cloud Computing.
IEEE Trans. Inf. Forensics Secur., 2024
IACR Cryptol. ePrint Arch., 2024
IPO-PEKS: Effective Inner Product Outsourcing Public Key Searchable Encryption From Lattice in the IoT.
IEEE Access, 2024
Bilateral Secure and Decentralized Crowdsourcing Task Matching Atop Consortium Blockchain.
Proceedings of the IEEE International Conference on Blockchain, 2024
Proof of Privacy-Preserving Machine Learning: A Blockchain Consensus Mechanism with Secure Deep Learning Process.
Proceedings of the IEEE International Conference on Blockchain, 2024
Proceedings of the Information Security and Privacy - 29th Australasian Conference, 2024
2023
dMCLAEKS: Pairing-free designated-tester multi-recipient certificateless authenticated encryption with keyword search for concealing search patterns.
J. Syst. Archit., November, 2023
LMCLAEKS: LWE-assisted multi-recipient certificateless authenticated encryption with keyword search.
Inf. Sci., November, 2023
Dynamic identity-based broadcast proxy re-encryption for data sharing in autonomous vehicles.
Trans. Emerg. Telecommun. Technol., November, 2023
Frontiers Comput. Sci., October, 2023
Quantum Inf. Comput., May, 2023
EPNS: Efficient Privacy-Preserving Intelligent Traffic Navigation From Multiparty Delegated Computation in Cloud-Assisted VANETs.
IEEE Trans. Mob. Comput., March, 2023
Generalized Autonomous Path Proxy Re-Encryption Scheme to Support Branch Functionality.
IEEE Trans. Inf. Forensics Secur., 2023
A Differentially Private Federated Learning Model Against Poisoning Attacks in Edge Computing.
IEEE Trans. Dependable Secur. Comput., 2023
Lightweight Privacy-Preserving Distributed Recommender System Using Tag-Based Multikey Fully Homomorphic Data Encapsulation.
IEEE Trans. Dependable Secur. Comput., 2023
BLDSS: A Blockchain-Based Lightweight Searchable Data Sharing Scheme in Vehicular Social Networks.
IEEE Internet Things J., 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
Proceedings of the Science of Cyber Security - 5th International Conference, 2023
Proceedings of the Science of Cyber Security - 5th International Conference, 2023
Proceedings of the 20th Annual International Conference on Privacy, Security and Trust, 2023
MMDSSE: Multi-client and Multi-keyword Dynamic Searchable Symmetric Encryption for Cloud Storage.
Proceedings of the 20th Annual International Conference on Privacy, Security and Trust, 2023
Mining for Better: An Energy-Recycling Consensus Algorithm to Enhance Stability with Deep Learning.
Proceedings of the Information Security Practice and Experience, 2023
2022
SAVE: Efficient Privacy-Preserving Location-Based Service Bundle Authentication in Self-Organizing Vehicular Social Networks.
IEEE Trans. Intell. Transp. Syst., 2022
Efficient Privacy-Preserving Outsourced Discrete Wavelet Transform in the Encrypted Domain.
IEEE Trans. Cloud Comput., 2022
J. Comput. Sci. Technol., 2022
The Secure Lattice-Based Data Aggregation Scheme in Residential Networks for Smart Grid.
IEEE Internet Things J., 2022
EPMDA-FED: Efficient and Privacy-Preserving Multidimensional Data Aggregation Scheme With Fast Error Detection in Smart Grid.
IEEE Internet Things J., 2022
A verifiable privacy-preserving data collection scheme supporting multi-party computation in fog-based smart grid.
Frontiers Comput. Sci., 2022
A survey on cryptographic techniques for protecting big data security: present and forthcoming.
Sci. China Inf. Sci., 2022
Autonomous Path Identity-Based Broadcast Proxy Re-Encryption for Data Sharing in Clouds.
IEEE Access, 2022
Proceedings of the 2022 SIAM International Conference on Data Mining, 2022
Lighter is Better: A Lighter Multi-client Verifiable Outsourced Computation with Hybrid Homomorphic Encryption.
Proceedings of the Computer Security - ESORICS 2022, 2022
2021
IEEE Trans. Smart Grid, 2021
IEEE Trans. Serv. Comput., 2021
IEEE Trans. Serv. Comput., 2021
PVOPM: Verifiable Privacy-Preserving Pattern Matching with Efficient Outsourcing in the Malicious Setting.
IEEE Trans. Dependable Secur. Comput., 2021
SESCF: A Secure and Efficient Supply Chain Framework via Blockchain-Based Smart Contracts.
Secur. Commun. Networks, 2021
PADP: Efficient Privacy-Preserving Data Aggregation and Dynamic Pricing for Vehicle-to-Grid Networks.
IEEE Internet Things J., 2021
Int. J. Inf. Comput. Secur., 2021
EURASIP J. Wirel. Commun. Netw., 2021
Des. Codes Cryptogr., 2021
Comput. J., 2021
Proceedings of the 17th International Conference on Mobility, Sensing and Networking, 2021
RTPoW: A Proof-of-Work Consensus Scheme with Real-Time Difficulty Adjustment Algorithm.
Proceedings of the 27th IEEE International Conference on Parallel and Distributed Systems, 2021
PSSBP: A Privacy-preserving Scope-query Searchable Encryption Scheme Based on Blockchain for Parking Lots Sharing in Vehicular Networks.
Proceedings of the 19th IEEE International Conference on Embedded and Ubiquitous Computing, 2021
PKMark: A Robust Zero-distortion Blind Reversible Scheme for Watermarking Relational Databases.
Proceedings of the 15th IEEE International Conference on Big Data Science and Engineering, 2021
2020
Multi-Value-Independent Ciphertext-Policy Attribute Based Encryption with Fast Keyword Search.
IEEE Trans. Serv. Comput., 2020
LPPA: Lightweight Privacy-Preserving Authentication From Efficient Multi-Key Secure Outsourced Computation for Location-Based Services in VANETs.
IEEE Trans. Inf. Forensics Secur., 2020
Blockchain-Based Lightweight Certificate Authority for Efficient Privacy-Preserving Location-Based Service in Vehicular Social Networks.
IEEE Internet Things J., 2020
Lightweight Privacy-Preserving Training and Evaluation for Discretized Neural Networks.
IEEE Internet Things J., 2020
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
VCKSCF: Efficient Verifiable Conjunctive Keyword Search Based on Cuckoo Filter for Cloud Storage.
IACR Cryptol. ePrint Arch., 2020
PVIDM: Privacy-preserving verifiable shape context based image denoising and matching with efficient outsourcing in the malicious setting.
Comput. Secur., 2020
Proceedings of the 19th IEEE International Conference on Trust, 2020
Proceedings of the Information Security - 23rd International Conference, 2020
Proceedings of the ICCSP 2020: 4th International Conference on Cryptography, 2020
Proceedings of the ICBCT'20: The 2nd International Conference on Blockchain Technology, 2020
Proceedings of the ICBCT'20: The 2nd International Conference on Blockchain Technology, 2020
2019
Detecting Vehicle Anomaly in the Edge via Sensor Consistency and Frequency Characteristic.
IEEE Trans. Veh. Technol., 2019
IACR Trans. Symmetric Cryptol., 2019
IEEE Trans. Dependable Secur. Comput., 2019
Peer-to-Peer Netw. Appl., 2019
Secure and efficient encrypted keyword search for multi-user setting in cloud computing.
Peer-to-Peer Netw. Appl., 2019
Pri-RTB: Privacy-preserving real-time bidding for securing mobile advertisement in ubiquitous computing.
Inf. Sci., 2019
Traceable and undeniable ciphertext-policy attribute-based encryption for cloud storage service.
Int. J. Distributed Sens. Networks, 2019
IACR Cryptol. ePrint Arch., 2019
GTSIM-POP: Game theory based secure incentive mechanism and patient-optimized privacy-preserving packet forwarding scheme in m-healthcare social networks.
Future Gener. Comput. Syst., 2019
All-But-Many Lossy Trapdoor Functions under Decisional RSA Subgroup Assumption and Application.
Comput. J., 2019
DMU-ABSE: Dynamic Multi-user Attribute-Based Searchable Encryption with File Deletion and User Revocation.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2019
Proceedings of the Advances in Information and Computer Security, 2019
SDKSE-KGA: A Secure Dynamic Keyword Searchable Encryption Scheme Against Keyword Guessing Attacks.
Proceedings of the Trust Management XIII - 13th IFIP WG 11.11 International Conference, 2019
A Verifiable Dynamic Multi-user Searchable Encryption Scheme without Trusted Third Parties.
Proceedings of the 25th IEEE International Conference on Parallel and Distributed Systems, 2019
Proceedings of the ICIT 2019, 2019
PPSAS: Lightweight Privacy-preserving Spectrum Aggregation and Auction in Cognitive Radio Networks.
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019
2018
Auditable σ-Time Outsourced Attribute-Based Encryption for Access Control in Cloud Computing.
IEEE Trans. Inf. Forensics Secur., 2018
White-Box Traceable CP-ABE for Cloud Storage Service: How to Catch People Leaking Their Access Credentials Effectively.
IEEE Trans. Dependable Secur. Comput., 2018
IEEE Commun. Mag., 2018
Comput. J., 2018
Privacy-preserving large-scale systems of linear equations in outsourcing storage and computation.
Sci. China Inf. Sci., 2018
VEPP: A Verifiable, Highly Efficient and Privacy-Preserving Protocol for Outsourcing Large Matrix Multiplication.
Proceedings of the Third International Conference on Security of Smart Cities, 2018
Proceedings of the Third International Conference on Security of Smart Cities, 2018
PPOIM: Privacy-Preserving Shape Context Based Image Denoising and Matching with Efficient Outsourcing.
Proceedings of the Information and Communications Security - 20th International Conference, 2018
Efficient Multi-keyword Searchable Encryption Based on Multi-input Inner-Product Functional Encryption.
Proceedings of the Information and Communications Security - 20th International Conference, 2018
Proceedings of the IEEE Global Communications Conference, 2018
2017
Wirel. Commun. Mob. Comput., 2017
Efficient Asymmetric Index Encapsulation Scheme for Anonymous Content Centric Networking.
Secur. Commun. Networks, 2017
Peer-to-Peer Netw. Appl., 2017
Peer-to-Peer Netw. Appl., 2017
Accountable CP-ABE with Public Verifiability: How to Effectively Protect the Outsourced Data in Cloud.
Int. J. Found. Comput. Sci., 2017
IACR Cryptol. ePrint Arch., 2017
Server-Aided Directly Revocable Ciphertext-Policy Attribute-Based Encryption with Verifiable Delegation.
Proceedings of the Information and Communications Security - 19th International Conference, 2017
Accountable Multi-authority Ciphertext-Policy Attribute-Based Encryption Without Key Escrow and Key Abuse.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017
2016
Secur. Commun. Networks, 2016
Secur. Commun. Networks, 2016
Cloud-based privacy-preserving aggregation architecture in multi-domain wireless networks.
Secur. Commun. Networks, 2016
Secur. Commun. Networks, 2016
Secure and efficient fine-grained multiple file sharing in cloud-assisted crowd sensing networks.
Peer-to-Peer Netw. Appl., 2016
Efficient IBE with Tight Reduction to Standard Assumption in the Multi-challenge Setting.
IACR Cryptol. ePrint Arch., 2016
Extended dual system group and shorter unbounded hierarchical identity based encryption.
Des. Codes Cryptogr., 2016
Efficient privacy-preserving temporal and spacial data aggregation for smart grid communications.
Concurr. Comput. Pract. Exp., 2016
Comput. J., 2016
Sci. China Inf. Sci., 2016
Accountable Ciphertext-Policy Attribute-Based Encryption Scheme Supporting Public Verifiability and Nonrepudiation.
Proceedings of the Provable Security, 2016
Proceedings of the Provable Security, 2016
Proceedings of the Computer Security - ESORICS 2016, 2016
Traceable CP-ABE with Short Ciphertexts: How to Catch People Selling Decryption Devices on eBay Efficiently.
Proceedings of the Computer Security - ESORICS 2016, 2016
Practical and Efficient Attribute-Based Encryption with Constant-Size Ciphertexts in Outsourced Verifiable Computation.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
2015
Security and privacy in cloud-assisted wireless wearable communications: Challenges, solutions, and future directions.
IEEE Wirel. Commun., 2015
PSMPA: Patient Self-Controllable and Multi-Level Privacy-Preserving Cooperative Authentication in Distributedm-Healthcare Cloud Computing System.
IEEE Trans. Parallel Distributed Syst., 2015
IEEE Trans. Inf. Forensics Secur., 2015
White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Flexible Attributes.
IEEE Trans. Inf. Forensics Secur., 2015
IEEE Trans. Inf. Forensics Secur., 2015
Practical identity-based encryption in multiple private key generator (PKG) environments.
Secur. Commun. Networks, 2015
ReDD: recommendation-based data dissemination in privacy-preserving mobile social networks.
Secur. Commun. Networks, 2015
MuDA: Multifunctional data aggregation in privacy-preserving smart grid communications.
Peer-to-Peer Netw. Appl., 2015
PDAFT: A privacy-preserving data aggregation scheme with fault tolerance for smart grid communications.
Peer-to-Peer Netw. Appl., 2015
IEEE J. Sel. Top. Signal Process., 2015
4S: A secure and privacy-preserving key management scheme for cloud-assisted wireless body area network in m-healthcare social networks.
Inf. Sci., 2015
Accountable Authority Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability and Public Auditing in the Cloud.
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
Comment on Quantum Cryptography - Which is More Important, Signal Security, Information Security or Communication Reliability.
IACR Cryptol. ePrint Arch., 2015
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015
Black-Box Separations of Hash-and-Sign Signatures in the Non-Programmable Random Oracle Model.
Proceedings of the Provable Security, 2015
TR-MABE: White-box traceable and revocable multi-authority attribute-based encryption and its applications to multi-level privacy-preserving e-healthcare cloud computing systems.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015
Proceedings of the 2015 IEEE/CIC International Conference on Communications in China, 2015
EVOC: More efficient verifiable outsourced computation from any one-way trapdoor function.
Proceedings of the 2015 IEEE International Conference on Communications, 2015
2014
A Probabilistic Misbehavior Detection Scheme toward Efficient Trust Establishment in Delay-Tolerant Networks.
IEEE Trans. Parallel Distributed Syst., 2014
Guest Editors' Introduction: Special Issue on Trust, Security, and Privacy in Parallel and Distributed Systems.
IEEE Trans. Parallel Distributed Syst., 2014
A scalable certificateless architecture for multicast wireless mesh network using proxy re-encryption.
Secur. Commun. Networks, 2014
Fully Collusion-Resistant Traceable Key-Policy Attribute-Based Encryption with Sub-linear Size Ciphertexts.
IACR Cryptol. ePrint Arch., 2014
Remarks on Quantum Modular Exponentiation and Some Experimental Demonstrations of Shor's Algorithm.
IACR Cryptol. ePrint Arch., 2014
On Shor's Factoring Algorithm with More Registers and the Problem to Certify Quantum Computers.
IACR Cryptol. ePrint Arch., 2014
Comput. J., 2014
Proceedings of the Wireless Internet - 8th International Conference, 2014
Proceedings of the Information and Communications Security - 16th International Conference, 2014
User self-controllable profile matching for privacy-preserving mobile social networks.
Proceedings of the IEEE International Conference on Communication Systems, 2014
Proceedings of the 2014 IEEE/CIC International Conference on Communications in China, 2014
Proceedings of the IEEE Global Communications Conference, 2014
An ElGamal-based efficient and privacy-preserving data aggregation scheme for smart grid.
Proceedings of the IEEE Global Communications Conference, 2014
Large Universe Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability.
Proceedings of the Computer Security - ESORICS 2014, 2014
Proceedings of the Applied Cryptography and Network Security, 2014
2013
Securing m-healthcare social networks: challenges, countermeasures and future directions.
IEEE Wirel. Commun., 2013
White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Any Monotone Access Structures.
IEEE Trans. Inf. Forensics Secur., 2013
Secur. Commun. Networks, 2013
More efficient CCA-secure unidirectional proxy re-encryption schemes without random oracles.
Secur. Commun. Networks, 2013
Secur. Commun. Networks, 2013
On the security and improvement of a two-factor user authentication scheme in wireless sensor networks.
Pers. Ubiquitous Comput., 2013
J. Intell. Syst., 2013
Inf. Sci., 2013
A comment on "An efficient common-multiplicand-multiplication method to the Montgomery algorithm for speeding up exponentiation".
Inf. Sci., 2013
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
On the Privacy of Khan et al.'s Dynamic ID-Based Remote Authentication Scheme with User Anonymity.
Cryptologia, 2013
SUCCESS: A Secure User-centric and Social-aware Reputation Based Incentive Scheme for DTNs.
Ad Hoc Sens. Wirel. Networks, 2013
Location privacy in database-driven Cognitive Radio Networks: Attacks and countermeasures.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013
Blackbox traceable CP-ABE: how to catch people leaking their keys by selling decryption devices on ebay.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
BDK: Secure and Efficient Biometric based Deterministic Key Agreement in Wireless Body Area Networks.
Proceedings of the 8th International Conference on Body Area Networks, 2013
2012
Secur. Commun. Networks, 2012
Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption.
Inf. Sci., 2012
PSCPA: Patient Self-controllable Privacy-preserving Cooperative Authentication in Distributed m-Healthcare Systems.
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
Leveraging Cloud Computing for Privacy Preserving Aggregation in Multi-domain Wireless Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2012
Proceedings of the Provable Security - 6th International Conference, 2012
TIS: A threshold incentive scheme for secure and reliable data forwarding in vehicular Delay Tolerant Networks.
Proceedings of the 2012 IEEE Global Communications Conference, 2012
Location privacy leaking from spectrum utilization information in database-driven cognitive radio network.
Proceedings of the ACM Conference on Computer and Communications Security, 2012
Proceedings of the Applied Cryptography and Network Security, 2012
2011
: An Efficient Privacy-Preserving Data-Forwarding Scheme for Service-Oriented Vehicular Ad Hoc Networks.
IEEE Trans. Veh. Technol., 2011
SCCR: a generic approach to simultaneously achieve CCA security and collusion-resistance in proxy re-encryption.
Secur. Commun. Networks, 2011
Secur. Commun. Networks, 2011
Secur. Commun. Networks, 2011
An Efficient Privacy Preserving Data Aggregation Scheme with Constant Communication Overheads for Wireless Sensor Networks.
IEEE Commun. Lett., 2011
IACR Cryptol. ePrint Arch., 2011
Comput. Electr. Eng., 2011
Comput. Electr. Eng., 2011
Efficient trust based information sharing schemes over distributed collaborative networks.
Proceedings of the MILCOM 2011, 2011
Proceedings of IEEE International Conference on Communications, 2011
MobiGame: A User-Centric Reputation Based Incentive Protocol for Delay/Disruption Tolerant Networks.
Proceedings of the Global Communications Conference, 2011
EPF: An Event-Aided Packet Forwarding Protocol for Privacy-Preserving Mobile Healthcare Social Networks.
Proceedings of the Global Communications Conference, 2011
Proceedings of the Eighth International Conference on Fuzzy Systems and Knowledge Discovery, 2011
Proceedings of the Eighth International Conference on Fuzzy Systems and Knowledge Discovery, 2011
Fully Secure Multi-authority Ciphertext-Policy Attribute-Based Encryption without Random Oracles.
Proceedings of the Computer Security - ESORICS 2011, 2011
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011
MobiID: A User-Centric and Social-Aware Reputation Based Incentive Scheme for Delay/Disruption Tolerant Networks.
Proceedings of the Ad-hoc, Mobile, and Wireless Networks - 10th International Conference, 2011
2010
J. Syst. Sci. Complex., 2010
Inf. Sci., 2010
Secure threshold multi authority attribute based encryption without a central authority.
Inf. Sci., 2010
On Efficiently Transferring the Linear Secret-Sharing Scheme Matrix in Ciphertext-Policy Attribute-Based Encryption.
IACR Cryptol. ePrint Arch., 2010
Conjugate adjoining problem in braid groups and new design of braid-based signatures.
Sci. China Inf. Sci., 2010
Comput. Electr. Eng., 2010
Constant-Round Concurrent Non-Malleable Statistically Binding Commitments and Decommitments.
Proceedings of the Public Key Cryptography, 2010
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010
Proceedings of the 30th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2010 Workshops), 2010
Proceedings of the 2010 IEEE International Conference on Granular Computing, 2010
Proceedings of the 6th International Conference on Collaborative Computing: Networking, 2010
Proceedings of the Information Security and Cryptology - 6th International Conference, 2010
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010
The Security Model of Unidirectional Proxy Re-Signature with Private Re-Signature Key.
Proceedings of the Information Security and Privacy - 15th Australasian Conference, 2010
2009
Wirel. Commun. Mob. Comput., 2009
An identity based universal designated verifier signature scheme secure in the standard model.
J. Syst. Softw., 2009
Inf. Sci., 2009
IEEE Commun. Lett., 2009
IEEE Commun. Lett., 2009
IACR Cryptol. ePrint Arch., 2009
IACR Cryptol. ePrint Arch., 2009
IACR Cryptol. ePrint Arch., 2009
Perfect forward secure identity-based authenticated key agreement protocol in the escrow mode.
Sci. China Ser. F Inf. Sci., 2009
An Observation on Non-Malleable Witness-Indistinguishability and Non-Malleable Zero-Knowledge.
Proceedings of the Theory and Applications of Models of Computation, 6th Annual Conference, 2009
Proceedings of the Provable Security, Third International Conference, 2009
Certificateless Threshold Signature for Data Report Authentication in Mobile Ad Hoc Network.
Proceedings of the Third International Conference on Network and System Security, 2009
An ECDLP-Based Threshold Proxy Signature Scheme Using Self-Certified Public Key System.
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2009
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009
Proceedings of IEEE International Conference on Communications, 2009
Bilinear-pairings Based Designated-verifier Threshold Proxy Signature Scheme.
Proceedings of the 2009 International Conference on Security & Management, 2009
Proceedings of the 2009 ACM Symposium on Information, 2009
Proceedings of the 2009 ACM Symposium on Information, 2009
Proceedings of the Advances in Cryptology, 2009
2008
TUA: A Novel Compromise-Resilient Authentication Architecture for Wireless Mesh Networks.
IEEE Trans. Wirel. Commun., 2008
Inf. Sci., 2008
Efficient Identity-based Authenticated Key Agreement Protocol with PKG Forward Secrecy.
Int. J. Netw. Secur., 2008
Efficient Certificateless Authentication and Key Agreement (CL-AK) for Grid Computing.
Int. J. Netw. Secur., 2008
Int. J. Netw. Secur., 2008
Int. J. Comput. Math., 2008
Cryptanalysis and improvement of an elliptic curve Diffie-Hellman key agreement protocol.
IEEE Commun. Lett., 2008
IACR Cryptol. ePrint Arch., 2008
Strongly Secure Authenticated Key Exchange Protocol Based on Computational Diffie-Hellman Problem.
IACR Cryptol. ePrint Arch., 2008
An ID-based Authenticated Key Exchange Protocol Based on Bilinear Diffie-Hellman Problem.
IACR Cryptol. ePrint Arch., 2008
Comput. Stand. Interfaces, 2008
Sci. China Ser. F Inf. Sci., 2008
Sci. China Ser. F Inf. Sci., 2008
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008
Proceedings of the 2008 Conference on Empirical Methods in Natural Language Processing, 2008
Proceedings of the Collaborative Computing: Networking, 2008
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008
2007
IEEE Trans. Consumer Electron., 2007
J. Comput. Sci. Technol., 2007
On Security of Two Nonrepudiable Threshold Multi-proxy Multi-signature Schemes with Shared Verification.
Int. J. Netw. Secur., 2007
Group Oriented Identity-based Deniable Authentication Protocol from the Bilinear Pairings.
Int. J. Netw. Secur., 2007
Int. J. Found. Comput. Sci., 2007
Practical Identity-Based Encryption (IBE) in Multiple PKG Environments and Its Applications.
IACR Cryptol. ePrint Arch., 2007
IACR Cryptol. ePrint Arch., 2007
IACR Cryptol. ePrint Arch., 2007
Comput. Stand. Interfaces, 2007
A secure anonymous routing protocol with authenticated key exchange for ad hoc networks.
Comput. Stand. Interfaces, 2007
Erratum to "Non-interactive deniable authentication protocol based on factoring"[Computer Standards & Interfaces 27 (2005) 401-405].
Comput. Stand. Interfaces, 2007
Sci. China Ser. F Inf. Sci., 2007
Ad Hoc Networks, 2007
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007
Proceedings of the Fourth International Conference on Information Technology: New Generations (ITNG 2007), 2007
Proceedings of the Information Security, 10th International Conference, 2007
Proceedings of the Progress in Cryptology, 2007
Proceedings of the Progress in Cryptology, 2007
ASRPAKE: An Anonymous Secure Routing Protocol with Authenticated Key Exchange for Wireless Ad Hoc Networks.
Proceedings of IEEE International Conference on Communications, 2007
2006
Authenticated encryption protocol with perfect forward secrecy for mobile communication.
Wirel. Commun. Mob. Comput., 2006
Off-line Password Guessing Attack on an Efficient Key Agreement Protocol for Secure Authentication.
Int. J. Netw. Secur., 2006
Authorization-Limited Transformation-Free Proxy Cryptosystems and Their Security Analyses.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006
New Identity-Based Authenticated Key Agreement Protocols from Pairings (without Random Oracles).
IACR Cryptol. ePrint Arch., 2006
IACR Cryptol. ePrint Arch., 2006
IACR Cryptol. ePrint Arch., 2006
Des. Codes Cryptogr., 2006
Comput. Secur., 2006
Sci. China Ser. F Inf. Sci., 2006
How to compute modular exponentiation with large operators based on the right-to-left binary algorithm.
Appl. Math. Comput., 2006
Efficient Password-Based Authentication and Key Exchange Scheme Preserving User Privacy.
Proceedings of the Wireless Algorithms, 2006
Proceedings of the Theory and Applications of Models of Computation, 2006
Proceedings of the Information Security Practice and Experience, 2006
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006
Two-Pass ID-Based Authenticated Key Agreement Protocol with Key Confirmation Using Pairings.
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006
Proceedings of the Cryptology and Network Security, 5th International Conference, 2006
Proceedings of the Cryptology and Network Security, 5th International Conference, 2006
Proceedings of the Autonomic and Trusted Computing, Third International Conference, 2006
Proceedings of the Information Security and Privacy, 11th Australasian Conference, 2006
2005
J. Syst. Softw., 2005
Informatica, 2005
IACR Cryptol. ePrint Arch., 2005
IACR Cryptol. ePrint Arch., 2005
Comput. Stand. Interfaces, 2005
Appl. Math. Comput., 2005
Appl. Math. Comput., 2005
Appl. Math. Comput., 2005
Appl. Math. Comput., 2005
Appl. Math. Comput., 2005
Appl. Math. Comput., 2005
Cryptanalysis of Li-Tzeng-Hwang's improved signature schemes based on factoring and discrete logarithms.
Appl. Math. Comput., 2005
Appl. Math. Comput., 2005
Appl. Math. Comput., 2005
Appl. Math. Comput., 2005
Appl. Math. Comput., 2005
Appl. Math. Comput., 2005
Improvement on Tzeng et al.'s nonrepudiable threshold multi-proxy multi-signature scheme with shared verification.
Appl. Math. Comput., 2005
Proceedings of the Parallel and Distributed Processing and Applications, 2005
Security of an Efficient ID-Based Authenticated Key Agreement Protocol from Pairings.
Proceedings of the Parallel and Distributed Processing and Applications, 2005
Proceedings of the Parallel and Distributed Processing and Applications, 2005
Proceedings of the Parallel and Distributed Processing and Applications, 2005
Proceedings of the Fuzzy Systems and Knowledge Discovery, Second International Conference, 2005
Proceedings of the Information Security and Cryptology, First SKLOIS Conference, 2005
Proceedings of the Computational Intelligence and Security, International Conference, 2005
Proceedings of the Computational Intelligence and Security, International Conference, 2005
Proceedings of the Computational Intelligence and Security, International Conference, 2005
Proceedings of the Cryptology and Network Security, 4th International Conference, 2005
Proceedings of the Cryptology and Network Security, 4th International Conference, 2005
Proceedings of the Cryptology and Network Security, 4th International Conference, 2005
Proceedings of the Fifth International Conference on Computer and Information Technology (CIT 2005), 2005
Proceedings of the Fifth International Conference on Computer and Information Technology (CIT 2005), 2005
2004
IACR Cryptol. ePrint Arch., 2004
Discret. Math., 2004
Sci. China Ser. F Inf. Sci., 2004
An Improved Threshold Proxy Signature Scheme Based on the RSA Cryptosystem.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2004
Proceedings of the Parallel and Distributed Computing: Applications and Technologies, 2004
Proceedings of the Parallel and Distributed Processing and Applications, 2004
Proceedings of the 3rd International Conference on Information Security, 2004
Proceedings of the 3rd International Conference on Information Security, 2004
Proceedings of the 3rd International Conference on Information Security, 2004
ID-based threshold decryption without random oracles and its application in key escrow.
Proceedings of the 3rd International Conference on Information Security, 2004
Proceedings of the 3rd International Conference on Information Security, 2004
Transformation-free proxy cryptosystems and their applications to electronic commerce.
Proceedings of the 3rd International Conference on Information Security, 2004
Proceedings of the Computational and Information Science, First International Symposium, 2004
Proceedings of the 2004 International Conference on Computer and Information Technology (CIT 2004), 2004
2003