Zhengtao Jiang
Orcid: 0000-0001-5888-2163
According to our database1,
Zhengtao Jiang
authored at least 35 papers
between 2005 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Sensors, July, 2024
Clust. Comput., June, 2024
2023
Symmetry, November, 2023
2022
A Practical Detection and Defense Scheme Against Smart Contract Attacks Based on Transaction Features.
Proceedings of the Mobile Internet Security - 6th International Symposium, 2022
Proceedings of the 22nd IEEE/ACIS International Conference on Computer and Information Science, 2022
2020
Int. J. Netw. Secur., 2020
2019
Identity-and-data privacy forward security public auditing protocol in the standard model.
Int. J. Commun. Syst., 2019
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2019
An Efficient Key-Aggregate Keyword Searchable Encryption for Data Sharing in Cloud Storage.
Proceedings of the 2019 IEEE Globecom Workshops, Waikoloa, HI, USA, December 9-13, 2019, 2019
2018
Int. J. Commun. Syst., 2018
2017
Proceedings of the Geo-Spatial Knowledge and Intelligence - 5th International Conference, 2017
2016
Linear Complexity of a Family of Pseudorandom Discrete Logarithm Threshold Sequences.
Int. J. Netw. Secur., 2016
Proceedings of the 15th IEEE/ACIS International Conference on Computer and Information Science, 2016
Proceedings of the 15th IEEE/ACIS International Conference on Computer and Information Science, 2016
2015
Proceedings of the 14th IEEE/ACIS International Conference on Computer and Information Science, 2015
2014
Int. J. Grid Util. Comput., 2014
A note on the Kirchhoff index of bicyclic graphs.
Ars Comb., 2014
2013
A non-delegatable strong designated verifier signature in ID-based setting for mobile environment.
Math. Comput. Model., 2013
A systematic method to design strong designated verifier signature without random oracles.
Clust. Comput., 2013
Proceedings of the 2013 IEEE International Conference on Services Computing, Santa Clara, CA, USA, June 28, 2013
2012
Progress and Research of Network System Survivability Scheme with Cooperative Information Management.
J. Networks, 2012
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012
An Efficient Probably CP-CM-Secure Identity-Based Signature Scheme Applicable to Authentication in Multiuser Settings.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012
An Efficient Identity-Based Strong Designated Verifier Signature without Delegatability.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012
Proceedings of the Fifth International Joint Conference on Computational Sciences and Optimization, 2012
2011
Int. J. Pattern Recognit. Artif. Intell., 2011
Proceedings of the Information Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea, November 30, 2011
Proceedings of the Information Security and Cryptology - 7th International Conference, 2011
2009
Investigations on Simultaneously Secure IBE Scheme and Security Proofs under RO and Non-RO Model.
Intell. Inf. Manag., 2009
Investigations on smart card-based secure protocols for autenticated key establishment in Digital pay-TV systems.
Proceedings of the 8th IEEE International Conference on Cognitive Informatics, 2009
2007
2005
Two methods of directly constructing probabilistic public-key encryption primitives based on third-order LFSR sequences.
Appl. Math. Comput., 2005
Appl. Math. Comput., 2005
Proceedings of the Computational Intelligence and Security, International Conference, 2005