Zuowen Tan
Orcid: 0000-0003-0199-4812
According to our database1,
Zuowen Tan
authored at least 35 papers
between 2004 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Secure Data Sharing Scheme Based on Dual Attribute Conversion for Cloud-Assisted IoT.
IEEE Internet Things J., October, 2024
Provably secure lightweight certificateless lattice-based authenticated key exchange scheme for IIoT.
Concurr. Comput. Pract. Exp., 2024
2021
Signal Process. Image Commun., 2021
Distributed Outsourced Privacy-Preserving Gradient Descent Methods among Multiple Parties.
Secur. Commun. Networks, 2021
Secur. Commun. Networks, 2021
2019
Blind Quality Assessment for DIBR-Synthesized Images Based on Chromatic and Disoccluded Information.
Proceedings of the Pattern Recognition and Computer Vision - Second Chinese Conference, 2019
2018
IEEE Access, 2018
2016
A privacy-preserving multi-server authenticated key-agreement scheme based on Chebyshev chaotic maps.
Secur. Commun. Networks, 2016
2015
J. Inf. Hiding Multim. Signal Process., 2015
Int. J. Commun. Syst., 2015
2014
A User Anonymity Preserving Three-Factor Authentication Scheme for Telecare Medicine Information Systems.
J. Medical Syst., 2014
2013
A communication and computation-efficient three-party authenticated key agreement protocol.
Secur. Commun. Networks, 2013
Secur. Commun. Networks, 2013
J. Comput., 2013
Inf. Technol. Control., 2013
2012
A lightweight conditional privacy-preserving authentication and access control scheme for pervasive computing environments.
J. Netw. Comput. Appl., 2012
Identity-based Authenticated Multiple Key Agreement Protocol with PKG Forward Security.
KSII Trans. Internet Inf. Syst., 2012
Electron. Commer. Res., 2012
2011
An Authentication and Key Agreement Scheme with Key Confirmation and Privacy-preservation for Multi-server Environments.
J. Comput., 2011
Comput. Electr. Eng., 2011
2010
J. Syst. Sci. Complex., 2010
J. Networks, 2010
J. Comput., 2010
An Enhanced Three-Party Authentication Key Exchange Protocol for Mobile Commerce Environments.
J. Commun., 2010
J. Convergence Inf. Technol., 2010
An Improvement on A Three-Party Authentication Key Exchange Protocol Using Elliptic Curve Cryptography.
J. Convergence Inf. Technol., 2010
2009
J. Inf. Sci. Eng., 2009
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009
2008
Proceedings of the 9th International Conference for Young Computer Scientists, 2008
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008
2007
Proceedings of the Computational Intelligence and Security, International Conference, 2007
2005
Proceedings of the Information Security Practice and Experience, 2005
2004
IACR Cryptol. ePrint Arch., 2004