Hong Zhong

According to our database1, Hong Zhong authored at least 84 papers between 2005 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2019
Security and Privacy for Next-Generation Wireless Networks
Wireless Networks, Springer, ISBN: 978-3-030-01149-9, 2019

PATH: privacy-preserving auction for heterogeneous spectrum allocations.
Wireless Networks, 2019

An Efficient Authentication Scheme Based on Semi-Trusted Authority in VANETs.
IEEE Trans. Vehicular Technology, 2019

An Efficient Message-Authentication Scheme Based on Edge Computing for Vehicular Ad Hoc Networks.
IEEE Trans. Intelligent Transportation Systems, 2019

SCPLBS: a smart cooperative platform for load balancing and security on SDN distributed controllers.
Peer-to-Peer Networking and Applications, 2019

Privacy-preserving authentication scheme with full aggregation in VANET.
Inf. Sci., 2019

OOABKS: Online/offline attribute-based encryption for keyword search in mobile cloud.
Inf. Sci., 2019

DDoS detection and defense mechanism based on cognitive-inspired computing in SDN.
Future Generation Comp. Syst., 2019

2018
HCPA-GKA: A hash function-based conditional privacy-preserving authentication and group-key agreement scheme for VANETs.
Vehicular Communications, 2018

Firework: Data Processing and Sharing for Hybrid Cloud-Edge Analytics.
IEEE Trans. Parallel Distrib. Syst., 2018

A Load-Balancing Mechanism for Distributed SDN Control Plane Using Response Time.
IEEE Trans. Network and Service Management, 2018

Multi-authority attribute-based encryption access control scheme with policy hidden for cloud storage.
Soft Comput., 2018

Privacy-Preserving Authentication Using a Double Pseudonym for Internet of Vehicles.
Sensors, 2018

Data aggregation with end-to-end confidentiality and integrity for large-scale wireless sensor networks.
Peer-to-Peer Networking and Applications, 2018

An efficient and secure recoverable data aggregation scheme for heterogeneous wireless sensor networks.
J. Parallel Distrib. Comput., 2018

AKSER: Attribute-based keyword search with efficient revocation in cloud computing.
Inf. Sci., 2018

An efficient certificateless aggregate signature without pairings for vehicular ad hoc networks.
Inf. Sci., 2018

Distributed Collaborative Execution on the Edges and Its Application to AMBER Alerts.
IEEE Internet of Things Journal, 2018

Efficient Privacy-Preserving Scheme for Real-Time Location Data in Vehicular Ad-Hoc Network.
IEEE Internet of Things Journal, 2018

Attribute-based Data Integrity Checking for Cloud Storage.
Fundam. Inform., 2018

Reprint of "LBBSRT: An efficient SDN load balancing scheme based on server response time".
Future Generation Comp. Syst., 2018

Conditional Privacy-Preserving Authentication Using Registration List in Vehicular Ad Hoc Networks.
IEEE Access, 2018

PP-MCSA: Privacy Preserving Multi-channel Double Spectrum Auction.
Proceedings of the Information and Communications Security - 20th International Conference, 2018

Transaction-Based Flow Rule Conflict Detection and Resolution in SDN.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018

Efficient Conditional Privacy-Preserving Authentication Scheme Using Revocation Messages for VANET.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018

Identity-Based Proofs of Storage with Enhanced Privacy.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

Differentially Private Location Protection with Continuous Time Stamps for VANETs.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

SMCLBRT: A Novel Load-Balancing Strategy of Multiple SDN Controllers Based on Response Time.
Proceedings of the 20th IEEE International Conference on High Performance Computing and Communications; 16th IEEE International Conference on Smart City; 4th IEEE International Conference on Data Science and Systems, 2018

Intrusion-Resilient Public Auditing Protocol for Data Storage in Cloud Computing.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018

TDDAD: Time-Based Detection and Defense Scheme Against DDoS Attack on SDN Controller.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018

2017
SPACF: A Secure Privacy-Preserving Authentication Scheme for VANET With Cuckoo Filter.
IEEE Trans. Vehicular Technology, 2017

Public Auditing with Privacy Protection in a Multi-User Model of Cloud-Assisted Body Sensor Networks.
Sensors, 2017

LEPA: A Lightweight and Efficient Public Auditing Scheme for Cloud-Assisted Wireless Body Sensor Networks.
Security and Communication Networks, 2017

Privacy-preserving point-inclusion protocol for an arbitrary area based on phase-encoded quantum private query.
Quantum Information Processing, 2017

A novel quantum scheme for secure two-party distance computation.
Quantum Information Processing, 2017

An Efficient ID-based Online/Offline Signature Scheme without Key Escrow.
I. J. Network Security, 2017

LBBSRT: An efficient SDN load balancing scheme based on server response time.
Future Generation Comp. Syst., 2017

Multiple multicast group key management for the Internet of People.
Concurrency and Computation: Practice and Experience, 2017

Area-based mobile multicast group key management scheme for secure mobile cooperative sensing.
SCIENCE CHINA Information Sciences, 2017

Verifiable Public Key Encryption Scheme With Equality Test in 5G Networks.
IEEE Access, 2017

Cooperative Query Answer Authentication Scheme Over Anonymous Sensing Data.
IEEE Access, 2017

Secure, efficient and practical double spectrum auction.
Proceedings of the 25th IEEE/ACM International Symposium on Quality of Service, 2017

A Privacy Protection Scheme for Vehicle's Location Based on Virtual Location and Route Confusion.
Proceedings of the 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2017

Enhancing AMBER alert using collaborative edges: poster.
Proceedings of the Second ACM/IEEE Symposium on Edge Computing, San Jose / Silicon Valley, 2017

Towards Secure and Verifiable Database-Driven Spectrum Sharing.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017

SCPLBS: A Smart Cooperative Platform for Load Balancing and Security on SDN Distributed Controllers.
Proceedings of the 3rd IEEE International Conference on Cybernetics, 2017

An Efficient Identity-Based Privacy-Preserving Authentication Scheme for VANETs.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2017

2016
Secure Nearest Neighbor Query on Crowd-Sensing Data.
Sensors, 2016

Many-to-one homomorphic encryption scheme.
Security and Communication Networks, 2016

Efficient extensible conditional privacy-preserving authentication scheme supporting batch verification for VANETs.
Security and Communication Networks, 2016

An efficient quantum scheme for Private Set Intersection.
Quantum Information Processing, 2016

An Efficient Electronic English Auction System with a Secure On-Shelf Mechanism and Privacy Preserving.
J. Electrical and Computer Engineering, 2016

A Novel Authenticated Group Key Distribution Scheme.
TIIS, 2016

Quantum private set intersection cardinality and its application to anonymous authentication.
Inf. Sci., 2016

Keyword search protocol with privacy preservation using ID-based proxy reencryption.
IJSN, 2016

Insecurity of a Certificate-free Ad Hoc Anonymous Authentication.
I. J. Network Security, 2016

ECPB: Efficient Conditional Privacy-Preserving Authentication Scheme Supporting Batch Verification for VANETs.
I. J. Network Security, 2016

Public auditing scheme for cloud-based wireless body area network.
Proceedings of the 9th International Conference on Utility and Cloud Computing, 2016

A fined-grained privacy-preserving access control protocol in wireless sensor networks.
Proceedings of the 9th International Conference on Utility and Cloud Computing, 2016

On Privacy-Preserving Cloud Auction.
Proceedings of the 35th IEEE Symposium on Reliable Distributed Systems, 2016

A Lightweight and Secure Data Authentication Scheme with Privacy Preservation for Wireless Sensor Networks.
Proceedings of the International Conference on Networking and Network Applications, 2016

Towards secure spectrum auction: both bids and bidder locations matter: poster.
Proceedings of the 17th ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2016

Non-repudiable Query Answer Authentication Scheme over Anonymous Cloud Data.
Proceedings of the International Conference on Advanced Cloud and Big Data, 2016

2015
Comments on two schemes of identity-based user authentication and key agreement for mobile client-server networks.
The Journal of Supercomputing, 2015

A novel one-to-many and many-to-one asymmetric encryption model and its algorithms.
Security and Communication Networks, 2015

An Efficient SDN Load Balancing Scheme Based on Variance Analysis for Massive Mobile Users.
Mobile Information Systems, 2015

Related-key cryptanalysis on 7-round AES-128/192.
IJESDF, 2015

2014
A novel anonymous authentication scheme without cryptography.
Trans. Emerging Telecommunications Technologies, 2014

2013
Quantum state sharing against the controller's cheating.
Quantum Information Processing, 2013

Erratum to: Multi-party quantum key agreement with Bell states and Bell measurements.
Quantum Information Processing, 2013

Multi-party quantum key agreement with bell states and bell measurements.
Quantum Information Processing, 2013

2012
Multiparty quantum secret sharing with the pure entangled two-photon states.
Quantum Information Processing, 2012

A novel anonymous secret sharing scheme based on BP Artificial Neural Network.
Proceedings of the Eighth International Conference on Natural Computation, 2012

Secure two-party computation of the quadratic function's extreme minimal value.
Proceedings of the 9th International Conference on Fuzzy Systems and Knowledge Discovery, 2012

2011
Multi-party quantum state sharing of an arbitrary two-qubit state with Bell states.
Quantum Information Processing, 2011

Asymmetric multi-party quantum state sharing of an arbitrary m-qubit state.
Quantum Information Processing, 2011

An Efficient Multiparty Quantum Secret Sharing with Pure Entangled Two Photon States.
Proceedings of the Advances in Computer Science, Environment, Ecoinformatics, and Education, 2011

A Protocol of Privacy-Preserving Closest Pair in Two Dimensional Space.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

2010
A Secure Scheme for Data Statistics.
Proceedings of the International Conference on E-Business and E-Government, 2010

2008
An Efficient (t, n)-Threshold Multi-Secret Sharing Scheme.
Proceedings of the International Workshop on Knowledge Discovery and Data Mining, 2008

A Threshold Multi-secret Sharing Scheme.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2008

2007
Secure Two-Party Point-Circle Inclusion Problem.
J. Comput. Sci. Technol., 2007

A (t, n)-threshold verified multi-secret sharing scheme based on ECDLP.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

2005
An Efficient Multiple-Precision Division Algorithm.
Proceedings of the Sixth International Conference on Parallel and Distributed Computing, 2005


  Loading...