Chunhua Su

According to our database1, Chunhua Su
  • authored at least 54 papers between 2007 and 2018.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Special Issue on Advanced Persistent Threat.
Future Generation Comp. Syst., 2018

I Walk, Therefore I Am: Continuous User Authentication with Plantar Biometrics.
IEEE Communications Magazine, 2018

Enhancing Trust Management for Wireless Intrusion Detection via Traffic Sampling in the Era of Big Data.
IEEE Access, 2018

Towards False Alarm Reduction Using Fuzzy If-Then Rules for Medical Cyber Physical Systems.
IEEE Access, 2018

2017
Recursive Matrix Oblivious RAM: An ORAM Construction for Constrained Storage Devices.
IEEE Trans. Information Forensics and Security, 2017

Universally Composable RFID Mutual Authentication.
IEEE Trans. Dependable Sec. Comput., 2017

Towards Accurate Statistical Analysis of Security Margins: New Searching Strategies for Differential Attacks.
IEEE Trans. Computers, 2017

A Novel Certificateless Signature Scheme for Smart Objects in the Internet-of-Things.
Sensors, 2017

Special issue on Secure Computation on Encrypted Data.
J. Inf. Sec. Appl., 2017

Probably Secure Keyed-Function Based Authenticated Encryption Schemes for Big Data.
Int. J. Found. Comput. Sci., 2017

A simple authentication encryption scheme.
Concurrency and Computation: Practice and Experience, 2017

Variable message encryption through blockcipher compression function.
Concurrency and Computation: Practice and Experience, 2017

Evaluation and Improvement of Pseudo-Random Number Generator for EPC Gen2.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Provable Secure Post-Quantum Signature Scheme Based on Isomorphism of Polynomials in Quantum Random Oracle Model.
Proceedings of the Provable Security, 2017

Exploring Energy Consumption of Juice Filming Charging Attack on Smartphones: A Pilot Study.
Proceedings of the Network and System Security - 11th International Conference, 2017

Automatic Encryption Schemes Based on the Neural Networks: Analysis and Discussions on the Various Adversarial Models (Short Paper).
Proceedings of the Information Security Practice and Experience, 2017

Evaluating the Impact of Juice Filming Charging Attack in Practical Environments.
Proceedings of the Information Security and Cryptology - ICISC 2017 - 20th International Conference, Seoul, South Korea, November 29, 2017

DABEHR: Decentralized Attribute-Based Electronic Health Record System with Constant-Size Storage Complexity.
Proceedings of the Green, Pervasive, and Cloud Computing - 12th International Conference, 2017

A simple construction of encryption for a tiny domain message.
Proceedings of the 51st Annual Conference on Information Sciences and Systems, 2017

2016
A Matrix Based ORAM: Design, Implementation and Experimental Analysis.
IEICE Transactions, 2016

Improved handover authentication and key pre-distribution for wireless mesh networks.
Concurrency and Computation: Practice and Experience, 2016

Privacy-Preserving Mining of Association Rules for Horizontally Distributed Databases Based on FP-Tree.
Proceedings of the Information Security Practice and Experience, 2016

Security and experimental performance analysis of a matrix ORAM.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Transparent authentication scheme with adaptive biometrie features for IoT networks.
Proceedings of the IEEE 5th Global Conference on Consumer Electronics, 2016

Efficient Multi-Function Data Sharing and Searching Mechanism for Cloud-Based Encrypted Data.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Recursive M-ORAM: A Matrix ORAM for Clients with Constrained Storage Space.
Proceedings of the Applications and Techniques in Information Security, 2016

Secure and Traceable Framework for Data Circulation.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

Improved (related-key) Attacks on Round-Reduced KATAN-32/48/64 Based on the Extended Boomerang Framework.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

An Efficient Construction of a Compression Function for Cryptographic Hash.
Proceedings of the Availability, Reliability, and Security in Information Systems, 2016

A Blockcipher Based Authentication Encryption.
Proceedings of the Availability, Reliability, and Security in Information Systems, 2016

2015
An improved preimage attack against HAVAL-3.
Inf. Process. Lett., 2015

M-ORAM: A Matrix ORAM with Log N Bandwidth Cost.
Proceedings of the Information Security Applications - 16th International Workshop, 2015

Improved Lightweight Pseudo-Random Number Generators for the Low-Cost RFID Tags.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

A New Statistical Approach for Integral Attack.
Proceedings of the Network and System Security - 9th International Conference, 2015

Analysis of Path ORAM toward Practical Utilization.
Proceedings of the 18th International Conference on Network-Based Information Systems, 2015

Improved Differential Characteristic Searching Methods.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

Accurate Estimation of the Full Differential Distribution for General Feistel Structures.
Proceedings of the Information Security and Cryptology - 11th International Conference, 2015

2014
Collaborative agglomerative document clustering with limited information disclosure.
Security and Communication Networks, 2014

Impossible differential cryptanalysis of LBlock with concrete investigation of key scheduling algorithm.
IACR Cryptology ePrint Archive, 2014

A Provable Secure Batch Authentication Scheme for EPCGen2 Tags.
Proceedings of the Provable Security - 8th International Conference, 2014

Improving Impossible Differential Cryptanalysis with Concrete Investigation of Key Scheduling Algorithm and Its Application to LBlock.
Proceedings of the Network and System Security - 8th International Conference, 2014

Distributed Pseudo-Random Number Generation and Its Application to Cloud Database.
Proceedings of the Information Security Practice and Experience, 2014

2012
A Survey on Privacy Frameworks for RFID Authentication.
IEICE Transactions, 2012

Analysis and Improvement of Privacy-Preserving Frequent Item Protocol for Accountable Computation Framework.
Proceedings of the 11th IEEE International Conference on Trust, 2012

2011
p-Moment exponential robust stability of grey neutral stochastic delay systems.
Grey Systems: T&A, 2011

2010
Two robust remote user authentication protocols using smart cards.
Journal of Systems and Software, 2010

Protecting and Restraining the Third Party in RFID-Enabled 3PL Supply Chains.
Proceedings of the Information Systems Security - 6th International Conference, 2010

2009
Distributed Noise Generation for Density Estimation Based Clustering without Trusted Third Party.
IEICE Transactions, 2009

Security and Correctness Analysis on Privacy-Preserving k-Means Clustering Schemes.
IEICE Transactions, 2009

Importance of Data Standardization in Privacy-Preserving K-Means Clustering.
Proceedings of the Database Systems for Advanced Applications, 2009

2008
A Distributed Privacy-Preserving Association Rules Mining Scheme Using Frequent-Pattern Tree.
Proceedings of the Advanced Data Mining and Applications, 4th International Conference, 2008

A New Scheme for Distributed Density Estimation based Privacy-Preserving Clustering.
Proceedings of the The Third International Conference on Availability, 2008

2007
Two-Party Privacy-Preserving Agglomerative Document Clustering.
Proceedings of the Information Security Practice and Experience, 2007

Privacy-Preserving Two-Party K-Means Clustering via Secure Approximation.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007


  Loading...