Haiyong Bao

According to our database1, Haiyong Bao authored at least 30 papers between 2005 and 2021.

Collaborative distances:



In proceedings 
PhD thesis 


On csauthors.net:


Smart and Practical Privacy-Preserving Data Aggregation for Fog-Based Smart Grids.
IEEE Trans. Inf. Forensics Secur., 2021

On Feasibility and Limitations of Detecting False Data Injection Attacks on Power Grid State Estimation Using D-FACTS Devices.
IEEE Trans. Ind. Informatics, 2020

Anti-Honeypot Enabled Optimal Attack Strategy for Industrial Cyber-Physical Systems.
IEEE Open J. Comput. Soc., 2020

A Privacy-Preserving and Verifiable Querying Scheme in Vehicular Fog Data Dissemination.
IEEE Trans. Veh. Technol., 2019

Towards insider threats detection in smart grid communication systems.
IET Commun., 2019

A privacy-preserving sensory data sharing scheme in Internet of Vehicles.
Future Gener. Comput. Syst., 2019

A Certificateless Verifiable Strong Designated Verifier Signature Scheme.
IEEE Access, 2019

Achieve Location Privacy-Preserving Range Query in Vehicular Sensing.
Sensors, 2017

A lightweight data aggregation scheme achieving privacy preservation and data integrity with differential privacy and fault tolerance.
Peer Peer Netw. Appl., 2017

Comment on "Privacy-Enhanced Data Aggregation Scheme Against Internal Attackers in Smart Grid".
IEEE Trans. Ind. Informatics, 2016

BLITHE: Behavior Rule-Based Insider Threat Detection for Smart Grid.
IEEE Internet Things J., 2016

Efficient and privacy-preserving skyline computation framework across domains.
Future Gener. Comput. Syst., 2016

A lightweight privacy-preserving scheme with data integrity for smart grid communications.
Concurr. Comput. Pract. Exp., 2016

A New Differentially Private Data Aggregation With Fault Tolerance for Smart Grid Communications.
IEEE Internet Things J., 2015

DDPFT: Secure data aggregation scheme with differential privacy and fault tolerance.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Group-Proxy Signature Scheme: A Novel Solution to Electronic Cash.
J. Intell. Syst., 2013

Novel conic-based group signature scheme with revocation.
Proceedings of the Eighth International Conference on Fuzzy Systems and Knowledge Discovery, 2011

Efficient and secure electronic resume using smart cards.
Proceedings of the Eighth International Conference on Fuzzy Systems and Knowledge Discovery, 2011

Biased Bit Commitment and Applications.
J. Inf. Sci. Eng., 2008

Efficient Certificateless Authentication and Key Agreement (CL-AK) for Grid Computing.
Int. J. Netw. Secur., 2008

A New ID-Based Deniable Authentication Protocol.
Informatica, 2007

Identity-Based Threshold Proxy Signature Scheme with Known Signers.
Proceedings of the Theory and Applications of Models of Computation, 2006

Two-Pass ID-Based Authenticated Key Agreement Protocol with Key Confirmation Using Pairings.
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006

Remarks on Wu-Hsu's threshold signature scheme using self-certified public keys.
J. Syst. Softw., 2005

Security of Pon-Lu-Jeng's Meta-He digital signature schemes.
Appl. Math. Comput., 2005

Cryptanalysis of Li-Tzeng-Hwang's improved signature schemes based on factoring and discrete logarithms.
Appl. Math. Comput., 2005

Improvement on Tzeng et al.'s nonrepudiable threshold multi-proxy multi-signature scheme with shared verification.
Appl. Math. Comput., 2005

Proxy signature scheme using self-certified public keys.
Appl. Math. Comput., 2005

Security of an Efficient ID-Based Authenticated Key Agreement Protocol from Pairings.
Proceedings of the Parallel and Distributed Processing and Applications, 2005

On the Security of a Group Signcryption Scheme from Distributed Signcryption Scheme.
Proceedings of the Cryptology and Network Security, 4th International Conference, 2005