Zhengping Jin
Orcid: 0000-0002-1468-4701
According to our database1,
Zhengping Jin
authored at least 67 papers
between 1986 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
Multi-player evolutionary game of federated learning incentive mechanism based on system dynamics.
Neurocomputing, November, 2023
Inf. Sci., July, 2023
2022
Dynamic Proof of Data Possession and Replication With Tree Sharing and Batch Verification in the Cloud.
IEEE Trans. Serv. Comput., 2022
Public Key Encryption With Equality Test Supporting Flexible Designated Authorization in Cloud Storage.
IEEE Syst. J., 2022
Int. J. Intell. Syst., 2022
2020
A Flexible KP-ABE Suit for Mobile User Realizing Decryption Outsourcing and Attribute Revocation.
Wirel. Pers. Commun., 2020
IEEE Trans. Inf. Forensics Secur., 2020
KNN search-based trajectory cloaking against the Cell-ID tracking in cellular network.
Soft Comput., 2020
A Multi-User Public Key Encryption with Multi-Keyword Search out of Bilinear Pairings.
Sensors, 2020
Multim. Tools Appl., 2020
New Blind Filter Protocol: An Improved Privacy-Preserving Scheme for Location-Based Services.
Comput. J., 2020
Improved Proofs Of Retrievability And Replication For Data Availability In Cloud Storage.
Comput. J., 2020
IEEE Access, 2020
2019
Decentralized, Revocable and Verifiable Attribute-Based Encryption in Hybrid Cloud System.
Wirel. Pers. Commun., 2019
Quantum-Resistant Identity-Based Signature with Message Recovery and Proxy Delegation.
Symmetry, 2019
Multim. Tools Appl., 2019
An efficient outsourced attribute-based encryption scheme in the device-to-device mobile network.
Int. J. Distributed Sens. Networks, 2019
Outsourced dynamic provable data possession with batch update for secure cloud storage.
Future Gener. Comput. Syst., 2019
IEEE Access, 2019
2018
Secure and Efficiently Searchable IoT Communication Data Management Model: Using Blockchain as a new tool.
CoRR, 2018
A Lattice-Based Unordered Aggregate Signature Scheme Based on the Intersection Method.
IEEE Access, 2018
IEEE Access, 2018
Proceedings of the Information Security Practice and Experience, 2018
Proceedings of the 2018 Artificial Intelligence and Cloud Computing Conference, 2018
2017
Int. J. Netw. Secur., 2017
2016
Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud Computing.
IEEE Trans. Parallel Distributed Syst., 2016
IEEE Trans. Broadcast., 2016
Int. J. Secur. Networks, 2016
Proceedings of the Security, Privacy and Anonymity in Computation, Communication and Storage, 2016
Proceedings of the Security, Privacy and Anonymity in Computation, Communication and Storage, 2016
2015
Analysis and Improvement of 'Chaotic Map Based Mobile Dynamic ID Authenticated Key Agreement Scheme'.
Wirel. Pers. Commun., 2015
A strongly secure identity-based authenticated key agreement protocol without pairings under the GDH assumption.
Secur. Commun. Networks, 2015
A Novel Authentication Scheme Using Self-certified Public Keys for Telecare Medical Information Systems.
J. Medical Syst., 2015
An Improved Biometrics-Based Authentication Scheme for Telecare Medical Information Systems.
J. Medical Syst., 2015
Inf. Sci., 2015
An anonymous and efficient remote biometrics user authentication scheme in a multi server environment.
Frontiers Comput. Sci., 2015
2014
A Secure and Efficient Authentication and Key Agreement Scheme Based on ECC for Telecare Medicine Information Systems.
J. Medical Syst., 2014
Secure Privacy-Preserving Biometric Authentication Scheme for Telecare Medicine Information Systems.
J. Medical Syst., 2014
Frontiers Comput. Sci., 2014
Cryptanalysis and improvement of a certificateless encryption scheme in the standard model.
Frontiers Comput. Sci., 2014
2013
An Efficient and Provably-Secure Certificateless Public Key Encryption Scheme for Telecare Medicine Information Systems.
J. Medical Syst., 2013
A Strongly Secure Pairing-free Certificateless Authenticated Key Agreement Protocol for Low-Power Devices.
Inf. Technol. Control., 2013
An improved authentication with key agreement scheme on elliptic curve cryptosystem for global mobility networks.
Int. J. Netw. Manag., 2013
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
A novel pairing-free certificateless authenticated key agreement protocol with provable security.
Frontiers Comput. Sci., 2013
Cryptanalysis and improvement of two certificateless three-party authenticated key agreement protocols
CoRR, 2013
Proceedings of the Eleventh Annual International Conference on Privacy, Security and Trust, 2013
Proceedings of the 2013 IEEE International Conference on Cluster Computing, 2013
2012
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012
An efficient and secure mobile payment protocol for restricted connectivity scenarios in vehicular ad hoc network.
Comput. Commun., 2012
An Anonymous Password-Authenticated and Key Exchange Protocol for Roaming Services in Wireless Networks.
Ad Hoc Sens. Wirel. Networks, 2012
An efficient Public Key Encryption with Conjunctive Keyword Search scheme based on pairings.
Proceedings of the 3rd IEEE International Conference on Network Infrastructure and Digital Content, 2012
2011
Analysis and improvement of a strongly secure certificateless key exchange protocol without pairing
CoRR, 2011
2010
A supplement to Liu et al.'s certificateless signcryption scheme in the standard model.
IACR Cryptol. ePrint Arch., 2010
An improved semantically-secure identity-based signcryption scheme in the standard model.
Comput. Electr. Eng., 2010
2008
An Efficient and Provably-Secure Identity-based Signcryption Scheme for Multiple PKGs.
IACR Cryptol. ePrint Arch., 2008
1990
Proceedings of IAPR Workshop on Machine Vision Applications, 1990
1989
Proceedings of the Alvey Vision Conference, 1989
1988
PhD thesis, 1988
1987
1986