Zuowen Tan

Orcid: 0000-0003-0199-4812

According to our database1, Zuowen Tan authored at least 35 papers between 2004 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Secure Data Sharing Scheme Based on Dual Attribute Conversion for Cloud-Assisted IoT.
IEEE Internet Things J., October, 2024

Provably secure lightweight certificateless lattice-based authenticated key exchange scheme for IIoT.
Concurr. Comput. Pract. Exp., 2024

2021
Objective quality assessment of synthesized images by local variation measurement.
Signal Process. Image Commun., 2021

Distributed Outsourced Privacy-Preserving Gradient Descent Methods among Multiple Parties.
Secur. Commun. Networks, 2021

Privacy-Preserving Two-Factor Key Agreement Protocol Based on Chebyshev Polynomials.
Secur. Commun. Networks, 2021

2019
Blind Quality Assessment for DIBR-Synthesized Images Based on Chromatic and Disoccluded Information.
Proceedings of the Pattern Recognition and Computer Vision - Second Chinese Conference, 2019

2018
Secure Delegation-Based Authentication for Telecare Medicine Information Systems.
IEEE Access, 2018

2016
A privacy-preserving multi-server authenticated key-agreement scheme based on Chebyshev chaotic maps.
Secur. Commun. Networks, 2016

2015
An Improved Anonymous Authentication Scheme for Roaming Services.
J. Inf. Hiding Multim. Signal Process., 2015

An efficient pairing-free identity-based authenticated group key agreement protocol.
Int. J. Commun. Syst., 2015

2014
A User Anonymity Preserving Three-Factor Authentication Scheme for Telecare Medicine Information Systems.
J. Medical Syst., 2014

2013
A communication and computation-efficient three-party authenticated key agreement protocol.
Secur. Commun. Networks, 2013

Efficient pairing-free provably secure identity-based proxy blind signature scheme.
Secur. Commun. Networks, 2013

Security Analysis on a Timestamp-based Remote User Authentication Scheme.
J. Comput., 2013

An Enhanced ID-based Authenticated Multiple Key Agreement Protocol.
Inf. Technol. Control., 2013

2012
A lightweight conditional privacy-preserving authentication and access control scheme for pervasive computing environments.
J. Netw. Comput. Appl., 2012

Identity-based Authenticated Multiple Key Agreement Protocol with PKG Forward Security.
KSII Trans. Internet Inf. Syst., 2012

An efficient identity-based tripartite authenticated key agreement protocol.
Electron. Commer. Res., 2012

2011
An Authentication and Key Agreement Scheme with Key Confirmation and Privacy-preservation for Multi-server Environments.
J. Comput., 2011

An Off-line Electronic Cash Scheme Based on Proxy Blind Signature.
Comput. J., 2011

Efficient identity-based authenticated multiple key exchange protocol.
Comput. Electr. Eng., 2011

2010
Improvement on a Threshold Authenticated Encryption Scheme.
J. Softw., 2010

A new threshold authenticated encryption scheme using labor-division signature.
J. Syst. Sci. Complex., 2010

Analysis and Improvement of a User Authentication Improved Protocol.
J. Networks, 2010

An E-Cash Scheme Based on Proxy Blind Signature from Bilinear Pairings.
J. Comput., 2010

An Enhanced Three-Party Authentication Key Exchange Protocol for Mobile Commerce Environments.
J. Commun., 2010

A Privacy-Preserving Mutual Authentication Protocol for Vehicle Ad Hoc Networks.
J. Convergence Inf. Technol., 2010

An Improvement on A Three-Party Authentication Key Exchange Protocol Using Elliptic Curve Cryptography.
J. Convergence Inf. Technol., 2010

2009
Cryptanalysis and Improvement on a Threshold Proxy Signature Scheme.
J. Inf. Sci. Eng., 2009

An Improved Identity-Based Group Signature Scheme.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009

2008
Hierarchical Proxy Blind Signature: A Solution to E-cash in the Real World.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

Study of Linearly Cross-Coupled Chaotic Systems for a Random Bit Generator.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008

2007
Improvement on a Generalized Scheme of Proxy Signature Based on Elliptic Curves.
Proceedings of the Computational Intelligence and Security, International Conference, 2007

2005
On the Security of Some Nonrepudiable Threshold Proxy Signature Schemes.
Proceedings of the Information Security Practice and Experience, 2005

2004
Provably Secure Delegation-by-Certification Proxy Signature Schemes.
IACR Cryptol. ePrint Arch., 2004


  Loading...