Cheng Hong

According to our database1, Cheng Hong authored at least 16 papers between 2011 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Covert Security with Public Verifiability: Faster, Leaner, and Simpler.
IACR Cryptology ePrint Archive, 2018

2017
The joint effect of association-based corporate posting strategy and eWOM comment valence on social media.
Internet Research, 2017

"Liking" and being "liked": How are personality traits and demographics associated with giving and receiving "likes" on Facebook?
Computers in Human Behavior, 2017

An Efficient Wireless Fronthaul (EWF) Method for LTE Signal Transmission.
Proceedings of the 85th IEEE Vehicular Technology Conference, 2017

Triple line-voltage cascaded VIENNA converter applied as the medium-voltage rectifier.
Proceedings of the IECON 2017 - 43rd Annual Conference of the IEEE Industrial Electronics Society, Beijing, China, October 29, 2017

Fast Multi-dimensional Range Queries on Encrypted Cloud Databases.
Proceedings of the Database Systems for Advanced Applications, 2017

2016
Fast Multi-keywords Search over Encrypted Cloud Data.
Proceedings of the Web Information Systems Engineering - WISE 2016, 2016

2015
Privacy-Enhancing Range Query Processing over Encrypted Cloud Databases.
Proceedings of the Web Information Systems Engineering - WISE 2015, 2015

A 15GHz Full Duplex System for Microwave Backhauling.
Proceedings of the IEEE 81st Vehicular Technology Conference, 2015

2014
Expressive and Secure Searchable Encryption in the Public Key Setting (Full Version).
IACR Cryptology ePrint Archive, 2014

A Novel Privacy-Preserving Group Matching Scheme in Social Networks.
Proceedings of the Web-Age Information Management - 15th International Conference, 2014

Expressive and Secure Searchable Encryption in the Public Key Setting.
Proceedings of the Information Security - 17th International Conference, 2014

2013
Holographic Projection Using Converging Spherical Wave Illumination.
Proceedings of the Seventh International Conference on Image and Graphics, 2013

A Secure Conjunctive Keywords Search over Encrypted Cloud Data Against Inclusion-Relation Attack.
Proceedings of the IEEE 5th International Conference on Cloud Computing Technology and Science, 2013

2012
A secure and efficient revocation scheme for fine-grained access control in cloud storage.
Proceedings of the 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings, 2012

2011
A Secure and Efficient Role-Based Access Policy towards Cryptographic Cloud Storage.
Proceedings of the Web-Age Information Management - 12th International Conference, 2011


  Loading...