Zhengjun Cao
Orcid: 0000-0003-2014-6093
According to our database1,
Zhengjun Cao
authored at least 154 papers
between 2004 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
Comment on "Efficient design of an authenticated key agreement protocol for dew-assisted IoT systems".
J. Supercomput., January, 2025
2024
Design issues in "a secure and efficient key agreement framework for critical energy infrastructure using mobile device".
Telecommun. Syst., July, 2024
A Note on "A Lightweight Cloud-Assisted Identity-Based Anonymous Authentication and Key Agreement Protocol for Secure Wireless Body Area Network".
IEEE Syst. J., March, 2024
Corrections to "Efficient Provably-Secure Dynamic ID-Based Authenticated Key Agreement Scheme With Enhanced Security Provision".
IEEE Trans. Dependable Secur. Comput., 2024
IACR Cryptol. ePrint Arch., 2024
A Note on "Privacy-Preserving and Secure Cloud Computing: A Case of Large-Scale Nonlinear Programming".
IACR Cryptol. ePrint Arch., 2024
On the Anonymity of One Authentication and Key Agreement Scheme for Peer-to-Peer Cloud.
IACR Cryptol. ePrint Arch., 2024
Design issues of "an anonymous authentication and key agreement protocol in smart living".
IACR Cryptol. ePrint Arch., 2024
On the anonymity of one authenticated key agreement scheme for mobile vehicles-assisted precision agricultural IoT networks.
IACR Cryptol. ePrint Arch., 2024
A Note on "Three-Factor Anonymous Authentication and Key Agreement Based on Fuzzy Biological Extraction for Industrial Internet of Things".
IACR Cryptol. ePrint Arch., 2024
Analysis of One Scheme for User Authentication and Session Key Agreement in Wireless Sensor Network Using Smart Card.
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
A Note on " Provably Secure and Lightweight Authentication Key Agreement Scheme for Smart Meters".
IACR Cryptol. ePrint Arch., 2024
A Note on "Secure and Distributed IoT Data Storage in Clouds Based on Secret Sharing and Collaborative Blockchain".
IACR Cryptol. ePrint Arch., 2024
A note on "a new password-authenticated module learning with rounding-based key exchange protocol: Saber.PAKE".
IACR Cryptol. ePrint Arch., 2024
A note on "a lightweight mutual and transitive authentication mechanism for IoT network".
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
A note on "intelligent drone-assisted robust lightweight multi-factor authentication for military zone surveillance in the 6G era".
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
2023
A Note on "Design of a Password Authentication and Key Agreement Scheme to Access e-Healthcare Services".
Wirel. Pers. Commun., December, 2023
A note on "SCPUAK: smart card-based secure protocol for remote user authentication and key agreement".
IACR Cryptol. ePrint Arch., 2023
A Note on "A Time-Sensitive Token-Based Anonymous Authentication and Dynamic Group Key Agreement Scheme for Industry 5.0".
IACR Cryptol. ePrint Arch., 2023
Analysis of one semi-quantum-honest key agreement scheme in MSTSA structure without entanglement.
IACR Cryptol. ePrint Arch., 2023
A Note on "a two-factor security authentication scheme for wireless sensor networks in IoT environments".
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
A note on "ISG-SLAS: secure and lightweight authentication and key agreement scheme for industrial smart grid using fuzzy extractor".
IACR Cryptol. ePrint Arch., 2023
A note on "blockchain-assisted authentication and key agreement scheme for fog-based smart grid".
IACR Cryptol. ePrint Arch., 2023
A Note on "Authenticated Key Agreement Protocol for Secure Communication Establishment in Vehicle-to-Grid Environment With FPGA Implementation".
IACR Cryptol. ePrint Arch., 2023
A Note on "A Lightweight and Privacy-Preserving Mutual Authentication and Key Agreement Protocol for Internet of Drones Environment".
IACR Cryptol. ePrint Arch., 2023
A note on "a multi-instance cancelable fingerprint biometric based secure session key agreement protocol employing elliptic curve cryptography and a double hash function".
IACR Cryptol. ePrint Arch., 2023
A note on "LAKAF: lightweight authentication and key agreement framework for smart grid network".
IACR Cryptol. ePrint Arch., 2023
A Note on "Privacy-Preserving Multi-Keyword Searchable Encryption for Distributed Systems".
IACR Cryptol. ePrint Arch., 2023
A Note on "On the Design of Mutual Authentication and Key Agreement Protocol in Internet of Vehicles-Enabled Intelligent Transportation System".
IACR Cryptol. ePrint Arch., 2023
A Note on "A Secure Anonymous D2D Mutual Authentication and Key Agreement Protocol for IoT".
IACR Cryptol. ePrint Arch., 2023
A note on "a lightweight mutual authentication and key agreement protocol for remote surgery application in Tactile Internet environment".
IACR Cryptol. ePrint Arch., 2023
A note on "faster and efficient cloud-server-aided data de-duplication scheme with an authenticated key agreement for Industrial Internet-of-Things".
IACR Cryptol. ePrint Arch., 2023
A Note on "Secure Multifactor Authenticated Key Agreement Scheme for Industrial IoT".
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
A note on "HAKECC: highly efficient authentication and key agreement scheme based on ECDH for RFID in IOT environment".
IACR Cryptol. ePrint Arch., 2023
A note on "a novel authentication and key agreement scheme for Internet of Vehicles".
IACR Cryptol. ePrint Arch., 2023
2022
Int. J. Bifurc. Chaos, 2022
2021
Comment on "Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption With Verifiable Delegation in Cloud Computing".
IEEE Trans. Parallel Distributed Syst., 2021
Comment on "Efficient Secure Outsourcing of Large-Scale Sparse Linear Systems of Equations".
IEEE Trans. Big Data, 2021
Quantum Inf. Process., 2021
Int. J. Inf. Comput. Secur., 2021
2020
Int. J. Netw. Secur., 2020
Int. J. Netw. Secur., 2020
IACR Cryptol. ePrint Arch., 2020
2019
IEEE Trans. Cloud Comput., 2019
2018
Analysis of One Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data.
Int. J. Netw. Secur., 2018
IACR Cryptol. ePrint Arch., 2018
2017
Analysis of One Scheme for Enabling Cloud Storage Auditing with Verifiable Outsourcing of Key Updates.
Int. J. Netw. Secur., 2017
Int. J. Netw. Secur., 2017
2016
Comment on "Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations".
IEEE Trans. Parallel Distributed Syst., 2016
Int. J. Netw. Secur., 2016
IACR Cryptol. ePrint Arch., 2016
A Note on One Privacy-Preserving Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data.
IACR Cryptol. ePrint Arch., 2016
A Note on One Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud.
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
A note on "achieving security, robust cheating resistance, and high-efficiency for outsourcing large matrix multiplication computation to a malicious cloud".
CoRR, 2016
A Note on "Confidentiality-Preserving Image Search: A Comparative Study Between Homomorphic Encryption and Distance-Preserving Randomization".
CoRR, 2016
2015
Int. J. Netw. Secur., 2015
Int. J. Netw. Secur., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
Comment on Quantum Cryptography - Which is More Important, Signal Security, Information Security or Communication Reliability.
IACR Cryptol. ePrint Arch., 2015
CoRR, 2015
Proceedings of the Seventh International Conference on Advanced Computational Intelligence, 2015
2014
Int. J. Comput. Math., 2014
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
Remarks on Quantum Modular Exponentiation and Some Experimental Demonstrations of Shor's Algorithm.
IACR Cryptol. ePrint Arch., 2014
On Shor's Factoring Algorithm with More Registers and the Problem to Certify Quantum Computers.
IACR Cryptol. ePrint Arch., 2014
A Note on the Quantum Modular Exponentiation Method Used in Shor's Factoring Algorithm.
CoRR, 2014
CoRR, 2014
CoRR, 2014
2013
IACR Cryptol. ePrint Arch., 2013
Improvement of Lin-Tzeng Solution to Yao's Millionaires Problem and Its Cheating Advantage Analysis.
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
Eavesdropping or Disrupting a Communication - On the Weakness of Quantum Communications.
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
Proceedings of the Information Computing and Applications - 4th International Conference, 2013
A Note on a Signature Building Block and Relevant Security Reduction in the Green-Hohenberger OT Scheme.
Proceedings of the Information Security and Cryptology - 9th International Conference, 2013
Modification of One Forward Secure Ring Signature Scheme Based on Bilinear Groups of Composite Order.
Proceedings of the 2013 International Conference on Cloud and Service Computing, 2013
2012
Proceedings of the Information Computing and Applications - Third International Conference, 2012
2011
CoRR, 2011
Proceedings of the Information and Communications Security - 13th International Conference, 2011
Proceedings of the Information Security and Cryptology - 7th International Conference, 2011
2010
IACR Cryptol. ePrint Arch., 2010
IACR Cryptol. ePrint Arch., 2010
Proceedings of the IEEE International Conference on Wireless Communications, 2010
2009
Proceedings of the Sixth International Conference on Information Technology: New Generations, 2009
Proceedings of the Complex Sciences, 2009
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009
Proceedings of the 8th IEEE/ACIS International Conference on Computer and Information Science, 2009
2008
Proceedings of the Software Engineering, 2008
Proceedings of the Proccedings of the Fourth International Conference on Information Assurance and Security, 2008
2007
IACR Cryptol. ePrint Arch., 2007
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007
Proceedings of the Information and Communications Security, 9th International Conference, 2007
2006
Proceedings of the Information Security and Cryptology, Second SKLOIS Conference, 2006
Proceedings of the Advances in Cryptology, 2006
2005
IACR Cryptol. ePrint Arch., 2005
IACR Cryptol. ePrint Arch., 2005
Proceedings of the Information Security and Cryptology, First SKLOIS Conference, 2005
2004
J. Approx. Theory, 2004
Universal Forgeability of a Forward-Secure Blind Signature Scheme Proposed by Duc et al.
IACR Cryptol. ePrint Arch., 2004
IACR Cryptol. ePrint Arch., 2004
IACR Cryptol. ePrint Arch., 2004
IACR Cryptol. ePrint Arch., 2004
IACR Cryptol. ePrint Arch., 2004
IACR Cryptol. ePrint Arch., 2004