Zongyang Zhang
Orcid: 0000-0003-1358-4933
According to our database1,
Zongyang Zhang
authored at least 52 papers
between 2009 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
IEEE Trans. Dependable Secur. Comput., 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Lightweight Instance Batch Schemes Towards Prover-Efficient Decentralized Private Computation.
Proceedings of the Information Security and Privacy - 29th Australasian Conference, 2024
2023
IET Inf. Secur., May, 2023
TI-BIoV: Traffic Information Interaction for Blockchain-Based IoV With Trust and Incentive.
IEEE Internet Things J., 2023
2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
Building blocks of sharding blockchain systems: Concepts, approaches, and open problems.
Comput. Sci. Rev., 2022
Comput. Secur., 2022
2021
A comprehensive survey on smart contract construction and execution: paradigms, tools, and systems.
Patterns, 2021
Proceedings of the Information and Communications Security - 23rd International Conference, 2021
UC-Secure Cryptographic Reverse Firewall-Guarding Corrupted Systems with the Minimum Trusted Module.
Proceedings of the Information Security and Cryptology - 17th International Conference, 2021
Redactable Transactions in Consortium Blockchain: Controlled by Multi-authority CP-ABE.
Proceedings of the Information Security and Privacy - 26th Australasian Conference, 2021
2020
Secure Outsourced Medical Data against Unexpected Leakage with Flexible Access Control in a Cloud Storage System.
Secur. Commun. Networks, 2020
Int. J. Inf. Sec., 2020
More realistic analysis of mass surveillance - security in multi-surveillant settings.
IET Inf. Secur., 2020
Comput. Secur., 2020
2019
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019
2018
IEEE Access, 2018
Proceedings of the Information Security - 21st International Conference, 2018
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018
2017
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017
2016
Secur. Commun. Networks, 2016
J. Comput. Secur., 2016
Sakai-Ohgishi-Kasahara identity-based non-interactive key exchange revisited and more.
Int. J. Inf. Sec., 2016
How to Obtain Fully Structure-Preserving (Automorphic) Signatures from Structure-Preserving Ones.
IACR Cryptol. ePrint Arch., 2016
Proceedings of the Information Security Practice and Experience, 2016
2015
Black-Box Separations of Hash-and-Sign Signatures in the Non-Programmable Random Oracle Model.
Proceedings of the Provable Security, 2015
2014
Sakai-Ohgishi-Kasahara Non-Interactive Identity-Based Key Exchange Scheme, Revisited.
IACR Cryptol. ePrint Arch., 2014
Comput. J., 2014
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014
Proceedings of the Applied Cryptography and Network Security, 2014
Sakai-Ohgishi-Kasahara Identity-Based Non-Interactive Key Exchange Scheme, Revisited.
Proceedings of the Information Security and Privacy - 19th Australasian Conference, 2014
2013
IACR Cryptol. ePrint Arch., 2013
2012
Secur. Commun. Networks, 2012
Proceedings of the Provable Security - 6th International Conference, 2012
Proceedings of the Applied Cryptography and Network Security, 2012
2011
CCA Secure IB-KEM from the Computational Bilinear Diffie-Hellman Assumption in the Standard Model.
IACR Cryptol. ePrint Arch., 2011
IACR Cryptol. ePrint Arch., 2011
2010
Constant-Round Concurrent Non-Malleable Statistically Binding Commitments and Decommitments.
Proceedings of the Public Key Cryptography, 2010
2009
An Observation on Non-Malleable Witness-Indistinguishability and Non-Malleable Zero-Knowledge.
Proceedings of the Theory and Applications of Models of Computation, 6th Annual Conference, 2009
Proceedings of the Advances in Cryptology, 2009