Hong Zhong

Orcid: 0000-0002-0392-9734

Affiliations:
  • Anhui University, School of Computer Science and Technology, Hefei, China


According to our database1, Hong Zhong authored at least 219 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A Decentralized Authenticated Key Agreement Scheme Based on Smart Contract for Securing Vehicular Ad-Hoc Networks.
IEEE Trans. Mob. Comput., May, 2024

Lightweight and Secure Data Sharing Based on Proxy Re-Encryption for Blockchain-Enabled Industrial Internet of Things.
IEEE Internet Things J., April, 2024

DPIVE: A Regionalized Location Obfuscation Scheme with Personalized Privacy Levels.
ACM Trans. Sens. Networks, March, 2024

DBCPA: Dual Blockchain-Assisted Conditional Privacy-Preserving Authentication Framework and Protocol for Vehicular Ad Hoc Networks.
IEEE Trans. Mob. Comput., February, 2024

CVAR: Distributed and Extensible Cross-Region Vehicle Authentication With Reputation for VANETs.
IEEE Trans. Intell. Transp. Syst., January, 2024

A Multilevel Electronic Control Unit Re-Encryption Scheme for Autonomous Vehicles.
IEEE Trans. Intell. Transp. Syst., January, 2024

A Practical and Provably Secure Authentication and Key Agreement Scheme for UAV-Assisted VANETs for Emergency Rescue.
IEEE Trans. Netw. Sci. Eng., 2024

2023
Efficient Blockchain-Based Data Integrity Auditing for Multi-Copy in Decentralized Storage.
IEEE Trans. Parallel Distributed Syst., December, 2023

L-TCM: A Lightweight Privacy-Preserving Traffic Condition Monitoring Scheme With Source Authentication in Cloud-Assisted VANETs.
IEEE Syst. J., December, 2023

SecuCar: Data Loss Prevention for Cloud Assisted VSS Based on Public Auditing Technique.
IEEE Trans. Veh. Technol., November, 2023

Lightweight Encryption and Authentication for Controller Area Network of Autonomous Vehicles.
IEEE Trans. Veh. Technol., November, 2023

AC-SDVN: An Access Control Protocol for Video Multicast in Software Defined Vehicular Networks.
IEEE Trans. Mob. Comput., October, 2023

LPPA-RCM: A lightweight privacy-preserving authentication scheme for road condition monitoring in fog-based VANETs.
J. Syst. Archit., October, 2023

Efficient reversible data hiding via two layers of double-peak embedding.
Inf. Sci., October, 2023

Collaborative Intrusion Detection System for SDVN: A Fairness Federated Deep Learning Approach.
IEEE Trans. Parallel Distributed Syst., September, 2023

Blockchain-Assisted Privacy-Preserving Traffic Route Management Scheme for Fog-Based Vehicular Ad-Hoc Networks.
IEEE Trans. Netw. Serv. Manag., September, 2023

Towards Multi-User, Secure, and Verifiable $k$NN Query in Cloud Database.
IEEE Trans. Knowl. Data Eng., September, 2023

Efficient Integrity Auditing Mechanism With Secure Deduplication for Blockchain Storage.
IEEE Trans. Computers, August, 2023

Synonym recognition from short texts: A self-supervised learning approach.
Expert Syst. Appl., August, 2023

Efficient regular expression matching over hybrid dictionary-based compressed data.
J. Netw. Comput. Appl., June, 2023

Short Text Topic Learning Using Heterogeneous Information Network.
IEEE Trans. Knowl. Data Eng., May, 2023

Conditional privacy-preserving message authentication scheme for cross-domain Industrial Internet of Things.
Ad Hoc Networks, May, 2023

Efficient Batch Authentication Scheme Based on Edge Computing in IIoT.
IEEE Trans. Netw. Serv. Manag., March, 2023

Chaotic Map-Based Authentication Scheme Using Physical Unclonable Function for Internet of Autonomous Vehicle.
IEEE Trans. Intell. Transp. Syst., March, 2023

Building Trusted Federated Learning: Key Technologies and Challenges.
J. Sens. Actuator Networks, February, 2023

Towards Fully Anonymous Integrity Checking and Reliability Authentication for Cloud Data Sharing.
IEEE Trans. Serv. Comput., 2023

Efficient and Anonymous Cross-Domain Authentication for IIoT Based on Blockchain.
IEEE Trans. Netw. Sci. Eng., 2023

Secure Edge Computing-Assisted Video Reporting Service in 5G-Enabled Vehicular Networks.
IEEE Trans. Inf. Forensics Secur., 2023

Efficient Anonymous Authentication Based on Physically Unclonable Function in Industrial Internet of Things.
IEEE Trans. Inf. Forensics Secur., 2023

Identity-Based Broadcast Proxy Re-Encryption for Flexible Data Sharing in VANETs.
IEEE Trans. Inf. Forensics Secur., 2023

A Lightweight and Conditional Privacy-Preserving Authenticated Key Agreement Scheme With Multi-TA Model for Fog-Based VANETs.
IEEE Trans. Dependable Secur. Comput., 2023

Achieving Revocable Attribute Group-Based Encryption for Mobile Cloud Data: A Multi-Proxy Assisted Approach.
IEEE Trans. Dependable Secur. Comput., 2023

Differentially Private Combinatorial Cloud Auction.
IEEE Trans. Cloud Comput., 2023

An Efficient Integrity Checking Scheme With Full Identity Anonymity for Cloud Data Sharing.
IEEE Trans. Cloud Comput., 2023

Multi-factor based session secret key agreement for the Industrial Internet of Things.
Ad Hoc Networks, 2023

Reversible Data Hiding in Encrypted Images Based on Block Classification Coding of Sparse Representation.
Proceedings of the Provable and Practical Security, 2023

Attribute-based Verifiable Outsourcing Decryption Encryption Scheme in IIoT.
Proceedings of the International Conference on Networking and Network Applications, 2023

SLCSA: Scalable Layered Cooperative Service Attestation Scheme in Cloud-Edge-End Cooperation Environments.
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023

Authenticated Ranked Keyword Search over Encrypted Data with Strong Privacy Guarantee.
Proceedings of the Database Systems for Advanced Applications, 2023

Poster: Membership Inference Attacks via Contrastive Learning.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
MOE/RF: A Novel Phishing Detection Model Based on Revised Multiobjective Evolution Optimization Algorithm and Random Forest.
IEEE Trans. Netw. Serv. Manag., December, 2022

Broadcast Encryption Scheme for V2I Communication in VANETs.
IEEE Trans. Veh. Technol., 2022

LBVP: A Lightweight Batch Verification Protocol for Fog-Based Vehicular Networks Using Self-Certified Public Key Cryptography.
IEEE Trans. Veh. Technol., 2022

A Practical and Efficient Bidirectional Access Control Scheme for Cloud-Edge Data Sharing.
IEEE Trans. Parallel Distributed Syst., 2022

Toward Data Transmission Security Based on Proxy Broadcast Re-encryption in Edge Collaboration.
ACM Trans. Sens. Networks, 2022

Proven Secure Tree-Based Authenticated Key Agreement for Securing V2V and V2I Communications in VANETs.
IEEE Trans. Mob. Comput., 2022

Reliable and Efficient Content Sharing for 5G-Enabled Vehicular Networks.
IEEE Trans. Intell. Transp. Syst., 2022

Secure and Efficient Data Sharing Among Vehicles Based on Consortium Blockchain.
IEEE Trans. Intell. Transp. Syst., 2022

Parallel Key-Insulated Multiuser Searchable Encryption for Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2022

CBACS: A Privacy-Preserving and Efficient Cache-Based Access Control Scheme for Software Defined Vehicular Networks.
IEEE Trans. Inf. Forensics Secur., 2022

Authentication and Key Agreement Based on Anonymous Identity for Peer-to-Peer Cloud.
IEEE Trans. Cloud Comput., 2022

Personalized Location Privacy Protection Based on Vehicle Movement Regularity in Vehicular Networks.
IEEE Syst. J., 2022

An Anonymous and Outsourcing-Supported Multiauthority Access Control Scheme With Revocation for Edge-Enabled IIoT System.
IEEE Syst. J., 2022

Secure and Lightweight Conditional Privacy-Preserving Authentication for Fog-Based Vehicular Ad Hoc Networks.
IEEE Internet Things J., 2022

EdgeEye: A Data-Driven Approach for Optimal Deployment of Edge Video Analytics.
IEEE Internet Things J., 2022

PersonalityGate: A general plug-and-play GNN gate to enhance cascade prediction with personality recognition task.
Expert Syst. Appl., 2022

Efficient reversible data hiding via two layers of double-peak embedding.
CoRR, 2022

Prediction-based dual-weight switch migration scheme for SDN load balancing.
Comput. Networks, 2022

Forward and backward secure searchable encryption with multi-keyword search and result verification.
Sci. China Inf. Sci., 2022

Dataset for Evaluation of DDoS Attacks Detection in Vehicular Ad-Hoc Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022

2021
Intelligent Drone-assisted Anonymous Authentication and Key Agreement for 5G/B5G Vehicular Ad-Hoc Networks.
IEEE Trans. Netw. Sci. Eng., 2021

QoS-Aware Multicast for Scalable Video Streaming in Software-Defined Networks.
IEEE Trans. Multim., 2021

SMAKA: Secure Many-to-Many Authentication and Key Agreement Scheme for Vehicular Networks.
IEEE Trans. Inf. Forensics Secur., 2021

Secure and Lightweight Conditional Privacy-Preserving Authentication for Securing Traffic Emergency Messages in VANETs.
IEEE Trans. Inf. Forensics Secur., 2021

Anonymous Message Authentication Scheme for Semitrusted Edge-Enabled IIoT.
IEEE Trans. Ind. Electron., 2021

PA-CRT: Chinese Remainder Theorem Based Conditional Privacy-Preserving Authentication Scheme in Vehicular Ad-Hoc Networks.
IEEE Trans. Dependable Secur. Comput., 2021

Secure $k$k-NN Query on Encrypted Cloud Data with Multiple Keys.
IEEE Trans. Big Data, 2021

PP-CSA: A Privacy-Preserving Cloud Storage Auditing Scheme for Data Sharing.
IEEE Syst. J., 2021

Toward Trusted and Secure Communication Among Multiple Internal Modules in CAV.
IEEE Internet Things J., 2021

AC4AV: A Flexible and Dynamic Access Control Framework for Connected and Autonomous Vehicles.
IEEE Internet Things J., 2021

Toward Achieving Fine-Grained Access Control of Data in Connected and Autonomous Vehicles.
IEEE Internet Things J., 2021

Leveraging Semisupervised Hierarchical Stacking Temporal Convolutional Network for Anomaly Detection in IoT Communication.
IEEE Internet Things J., 2021

Utility-efficient differentially private K-means clustering based on cluster merging.
Neurocomputing, 2021

An efficient and outsourcing-supported attribute-based access control scheme for edge-enabled smart healthcare.
Future Gener. Comput. Syst., 2021

IBEET-AOK: ID-based encryption with equality test against off-line KGAs for cloud medical services.
Frontiers Comput. Sci., 2021

Differentially private user-based collaborative filtering recommendation based on k-means clustering.
Expert Syst. Appl., 2021

PersonalityGate: A General Plug-and-Play GNN Gate to Enhance Cascade Prediction with Personality Recognition Task.
CoRR, 2021

Regionalized location obfuscation mechanism with personalized privacy levels.
CoRR, 2021

On the differential privacy of dynamic location obfuscation with personalized error bounds.
CoRR, 2021

Fair auctioning and trading framework for cloud virtual machines based on blockchain.
Comput. Commun., 2021

Assessing Profit of Prediction for SDN controllers load balancing.
Comput. Networks, 2021

A trusted and collaborative framework for deep learning in IoT.
Comput. Networks, 2021

Differentially Private Double Auction with Reliability-Aware in Mobile Crowd Sensing.
Ad Hoc Networks, 2021

Scalable QoS-Aware Multicast for SVC Streams in Software-Defined Networks.
Proceedings of the IEEE Symposium on Computers and Communications, 2021

DDoS Defense Scheme Based on Machine Learning in Software-Defined Networking.
Proceedings of the 2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, 2021

Accelerating Knuth-Morris-Pratt String Matching over LZ77 Compressed Text.
Proceedings of the 31st Data Compression Conference, 2021

Secure and Efficient Certificateless Provable Data Possession for Cloud-Based Data Management Systems.
Proceedings of the Database Systems for Advanced Applications, 2021

2020
Secure mutual authentication with privacy preservation in vehicular ad hoc networks.
Veh. Commun., 2020

Edge Computing-Based Privacy-Preserving Authentication Framework and Protocol for 5G-Enabled Vehicular Networks.
IEEE Trans. Veh. Technol., 2020

Full Session Key Agreement Scheme Based on Chaotic Map in Vehicular Ad Hoc Networks.
IEEE Trans. Veh. Technol., 2020

Extensible Conditional Privacy Protection Authentication Scheme for Secure Vehicular Networks in a Multi-Cloud Environment.
IEEE Trans. Inf. Forensics Secur., 2020

Enhanced Security Identity-Based Privacy-Preserving Authentication Scheme Supporting Revocation for VANETs.
IEEE Syst. J., 2020

A Public Auditing Protocol for Cloud Storage System With Intrusion-Resilience.
IEEE Syst. J., 2020

Edge Computing in VANETs-An Efficient and Privacy-Preserving Cooperative Downloading Scheme.
IEEE J. Sel. Areas Commun., 2020

Efficient dynamic multi-keyword fuzzy search over encrypted cloud data.
J. Netw. Comput. Appl., 2020

A weight-based conditional privacy-preserving authentication scheme in software-defined vehicular network.
J. Cloud Comput., 2020

A novel privacy-preserving speech recognition framework using bidirectional LSTM.
J. Cloud Comput., 2020

Intrusion-resilient public cloud auditing scheme with authenticator update.
Inf. Sci., 2020

An Extensible and Effective Anonymous Batch Authentication Scheme for Smart Vehicular Networks.
IEEE Internet Things J., 2020

DCDChain: A Credible Architecture of Digital Copyright Detection Based on Blockchain.
CoRR, 2020

A Differentially Private Framework in Spatial Crowdsourcing with Historical Data Learning.
CoRR, 2020

Fair Auction and Trade Framework for Cloud VM Allocation based on Blockchain.
CoRR, 2020

LBBESA: An efficient software-defined networking load-balancing scheme based on elevator scheduling algorithm.
Concurr. Comput. Pract. Exp., 2020

Two-stage index-based central keyword-ranked searches over encrypted cloud data.
Sci. China Inf. Sci., 2020

LPE-RCM: Lightweight Privacy-Preserving Edge-Based Road Condition Monitoring for VANETs.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2020

DDoS detection and defense mechanism for SDN controllers with K-Means.
Proceedings of the 13th IEEE/ACM International Conference on Utility and Cloud Computing, 2020

TCNN: Two-Way Convolutional Neural Network for Image Steganalysis.
Proceedings of the Security and Privacy in Communication Networks, 2020

Lightweight Proofs of Storage with Public Verifiability from Lattices.
Proceedings of the 22nd IEEE International Conference on High Performance Computing and Communications; 18th IEEE International Conference on Smart City; 6th IEEE International Conference on Data Science and Systems, 2020

2019
Security and Privacy for Next-Generation Wireless Networks
Wireless Networks, Springer, ISBN: 978-3-030-01149-9, 2019

PATH: privacy-preserving auction for heterogeneous spectrum allocations.
Wirel. Networks, 2019

An Efficient Authentication Scheme Based on Semi-Trusted Authority in VANETs.
IEEE Trans. Veh. Technol., 2019

An Efficient Message-Authentication Scheme Based on Edge Computing for Vehicular Ad Hoc Networks.
IEEE Trans. Intell. Transp. Syst., 2019

Differentially Private Double Spectrum Auction With Approximate Social Welfare Maximization.
IEEE Trans. Inf. Forensics Secur., 2019

SCPLBS: a smart cooperative platform for load balancing and security on SDN distributed controllers.
Peer-to-Peer Netw. Appl., 2019

Edge Video Analytics for Public Safety: A Review.
Proc. IEEE, 2019

Probabilistic matrix factorization with personalized differential privacy.
Knowl. Based Syst., 2019

Privacy-preserving authentication scheme with full aggregation in VANET.
Inf. Sci., 2019

OOABKS: Online/offline attribute-based encryption for keyword search in mobile cloud.
Inf. Sci., 2019

Lightweight Privacy-Preserving Identity-Based Verifiable IoT-Based Health Storage System.
IEEE Internet Things J., 2019

RSMA: Reputation System-Based Lightweight Message Authentication Framework and Protocol for 5G-Enabled Vehicular Networks.
IEEE Internet Things J., 2019

DDoS detection and defense mechanism based on cognitive-inspired computing in SDN.
Future Gener. Comput. Syst., 2019

Secure data sharing scheme for VANETs based on edge computing.
EURASIP J. Wirel. Commun. Netw., 2019

Privacy-preserving Double Auction Mechanism Based on Homomorphic Encryption and Sorting Networks.
CoRR, 2019

Differentially Private Aggregated Mobility Data Publication Using Moving Characteristics.
CoRR, 2019

A New Message Authentication Scheme for Multiple Devices in Intelligent Connected Vehicles Based on Edge Computing.
IEEE Access, 2019

Publicly-Verifiable Proofs of Storage Based on the Discrete Logarithm Problem.
IEEE Access, 2019

HS-TCN: A Semi-supervised Hierarchical Stacking Temporal Convolutional Network for Anomaly Detection in IoT.
Proceedings of the 38th IEEE International Performance Computing and Communications Conference, 2019

MobileEdge: Enhancing On-Board Vehicle Computing Units Using Mobile Edges for CAVs.
Proceedings of the 25th IEEE International Conference on Parallel and Distributed Systems, 2019

Towards Efficient Privacy-Preserving Auction Mechanism for Two-Sided Cloud Markets.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

RTEF-PP: A Robust Trust Evaluation Framework with Privacy Protection for Cloud Services Providers.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2019

Acoustic Scene Classification Using Deep Convolutional Neural Network via Transfer Learning.
Proceedings of the International Conference on Asian Language Processing, 2019

2018
HCPA-GKA: A hash function-based conditional privacy-preserving authentication and group-key agreement scheme for VANETs.
Veh. Commun., 2018

Firework: Data Processing and Sharing for Hybrid Cloud-Edge Analytics.
IEEE Trans. Parallel Distributed Syst., 2018

A Load-Balancing Mechanism for Distributed SDN Control Plane Using Response Time.
IEEE Trans. Netw. Serv. Manag., 2018

Multi-authority attribute-based encryption access control scheme with policy hidden for cloud storage.
Soft Comput., 2018

Privacy-Preserving Authentication Using a Double Pseudonym for Internet of Vehicles.
Sensors, 2018

Data aggregation with end-to-end confidentiality and integrity for large-scale wireless sensor networks.
Peer-to-Peer Netw. Appl., 2018

An efficient and secure recoverable data aggregation scheme for heterogeneous wireless sensor networks.
J. Parallel Distributed Comput., 2018

AKSER: Attribute-based keyword search with efficient revocation in cloud computing.
Inf. Sci., 2018

An efficient certificateless aggregate signature without pairings for vehicular ad hoc networks.
Inf. Sci., 2018

Distributed Collaborative Execution on the Edges and Its Application to AMBER Alerts.
IEEE Internet Things J., 2018

Efficient Privacy-Preserving Scheme for Real-Time Location Data in Vehicular Ad-Hoc Network.
IEEE Internet Things J., 2018

Attribute-based Data Integrity Checking for Cloud Storage.
Fundam. Informaticae, 2018

Reprint of "LBBSRT: An efficient SDN load balancing scheme based on server response time".
Future Gener. Comput. Syst., 2018

Making Double Spectrum Auction Practical: Both Privacy and Efficiency Matter.
CoRR, 2018

Conditional Privacy-Preserving Authentication Using Registration List in Vehicular Ad Hoc Networks.
IEEE Access, 2018

PP-MCSA: Privacy Preserving Multi-channel Double Spectrum Auction.
Proceedings of the Information and Communications Security - 20th International Conference, 2018

OpenVDAP: An Open Vehicular Data Analytics Platform for CAVs.
Proceedings of the 38th IEEE International Conference on Distributed Computing Systems, 2018

Transaction-Based Flow Rule Conflict Detection and Resolution in SDN.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018

Efficient Conditional Privacy-Preserving Authentication Scheme Using Revocation Messages for VANET.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018

Identity-Based Proofs of Storage with Enhanced Privacy.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

Differentially Private Location Protection with Continuous Time Stamps for VANETs.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

SMCLBRT: A Novel Load-Balancing Strategy of Multiple SDN Controllers Based on Response Time.
Proceedings of the 20th IEEE International Conference on High Performance Computing and Communications; 16th IEEE International Conference on Smart City; 4th IEEE International Conference on Data Science and Systems, 2018

How Edge Computing and Initial Congestion Window Affect Latency of Web-Based Services: Early Experiences with Baidu?
Proceedings of the 2018 IEEE/ACM Symposium on Edge Computing, 2018

Intrusion-Resilient Public Auditing Protocol for Data Storage in Cloud Computing.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018

TDDAD: Time-Based Detection and Defense Scheme Against DDoS Attack on SDN Controller.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018

2017
SPACF: A Secure Privacy-Preserving Authentication Scheme for VANET With Cuckoo Filter.
IEEE Trans. Veh. Technol., 2017

Public Auditing with Privacy Protection in a Multi-User Model of Cloud-Assisted Body Sensor Networks.
Sensors, 2017

LEPA: A Lightweight and Efficient Public Auditing Scheme for Cloud-Assisted Wireless Body Sensor Networks.
Secur. Commun. Networks, 2017

Privacy-preserving point-inclusion protocol for an arbitrary area based on phase-encoded quantum private query.
Quantum Inf. Process., 2017

A novel quantum scheme for secure two-party distance computation.
Quantum Inf. Process., 2017

An Efficient ID-based Online/Offline Signature Scheme without Key Escrow.
Int. J. Netw. Secur., 2017

LBBSRT: An efficient SDN load balancing scheme based on server response time.
Future Gener. Comput. Syst., 2017

Multiple multicast group key management for the Internet of People.
Concurr. Comput. Pract. Exp., 2017

Area-based mobile multicast group key management scheme for secure mobile cooperative sensing.
Sci. China Inf. Sci., 2017

Verifiable Public Key Encryption Scheme With Equality Test in 5G Networks.
IEEE Access, 2017

Cooperative Query Answer Authentication Scheme Over Anonymous Sensing Data.
IEEE Access, 2017

Secure, efficient and practical double spectrum auction.
Proceedings of the 25th IEEE/ACM International Symposium on Quality of Service, 2017

A Privacy Protection Scheme for Vehicle's Location Based on Virtual Location and Route Confusion.
Proceedings of the 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2017

Enhancing AMBER alert using collaborative edges: poster.
Proceedings of the Second ACM/IEEE Symposium on Edge Computing, San Jose / Silicon Valley, 2017

Towards Secure and Verifiable Database-Driven Spectrum Sharing.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017

An Efficient Identity-Based Privacy-Preserving Authentication Scheme for VANETs.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2017

2016
Secure Nearest Neighbor Query on Crowd-Sensing Data.
Sensors, 2016

Many-to-one homomorphic encryption scheme.
Secur. Commun. Networks, 2016

Efficient extensible conditional privacy-preserving authentication scheme supporting batch verification for VANETs.
Secur. Commun. Networks, 2016

An efficient quantum scheme for Private Set Intersection.
Quantum Inf. Process., 2016

基于组合阶双线性群的组签名方案的分析与改进 (Correctness Analysis and Improvement of Group Signature in Composite Order Bilinear Groups).
计算机科学, 2016

基于编码和同态加密的高效SMP方案 (Efficient Solution to SMP Based on Coding and Homomorphic Encryption).
计算机科学, 2016

基于中国剩余定理的群签名改进方案 (Improved Group Signature Scheme Based on Chinese Remainder Theorem).
计算机科学, 2016

An Improved Identity-Based Multi-Proxy Multi-Signature Scheme.
J. Inf. Hiding Multim. Signal Process., 2016

A Novel Fragile Watermark-Based Image Authentication Scheme for AMBTC-Compressed Images.
J. Inf. Hiding Multim. Signal Process., 2016

An Efficient Electronic English Auction System with a Secure On-Shelf Mechanism and Privacy Preserving.
J. Electr. Comput. Eng., 2016

A Novel Authenticated Group Key Distribution Scheme.
KSII Trans. Internet Inf. Syst., 2016

Quantum private set intersection cardinality and its application to anonymous authentication.
Inf. Sci., 2016

Keyword search protocol with privacy preservation using ID-based proxy reencryption.
Int. J. Secur. Networks, 2016

Insecurity of a Certificate-free Ad Hoc Anonymous Authentication.
Int. J. Netw. Secur., 2016

ECPB: Efficient Conditional Privacy-Preserving Authentication Scheme Supporting Batch Verification for VANETs.
Int. J. Netw. Secur., 2016

Public auditing scheme for cloud-based wireless body area network.
Proceedings of the 9th International Conference on Utility and Cloud Computing, 2016

A fined-grained privacy-preserving access control protocol in wireless sensor networks.
Proceedings of the 9th International Conference on Utility and Cloud Computing, 2016

On Privacy-Preserving Cloud Auction.
Proceedings of the 35th IEEE Symposium on Reliable Distributed Systems, 2016

A Lightweight and Secure Data Authentication Scheme with Privacy Preservation for Wireless Sensor Networks.
Proceedings of the International Conference on Networking and Network Applications, 2016

Towards secure spectrum auction: both bids and bidder locations matter: poster.
Proceedings of the 17th ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2016

Firework: Big Data Sharing and Processing in Collaborative Edge Environment.
Proceedings of the Fourth IEEE Workshop on Hot Topics in Web Systems and Technologies, 2016

Message from the chairs.
Proceedings of the Seventh International Green and Sustainable Computing Conference, 2016

Demo Abstract: EVAPS: Edge Video Analysis for Public Safety.
Proceedings of the IEEE/ACM Symposium on Edge Computing, 2016

Non-repudiable Query Answer Authentication Scheme over Anonymous Cloud Data.
Proceedings of the International Conference on Advanced Cloud and Big Data, 2016

2015
Comments on two schemes of identity-based user authentication and key agreement for mobile client-server networks.
J. Supercomput., 2015

A novel one-to-many and many-to-one asymmetric encryption model and its algorithms.
Secur. Commun. Networks, 2015

An Efficient SDN Load Balancing Scheme Based on Variance Analysis for Massive Mobile Users.
Mob. Inf. Syst., 2015

A New AES S-Box Equation System Based on BES.
J. Inf. Hiding Multim. Signal Process., 2015

Related-key cryptanalysis on 7-round AES-128/192.
Int. J. Electron. Secur. Digit. Forensics, 2015

2014
A novel anonymous authentication scheme without cryptography.
Trans. Emerg. Telecommun. Technol., 2014

Multi-authority based weighted attribute encryption scheme in cloud computing.
Proceedings of the 10th International Conference on Natural Computation, 2014

2013
Quantum state sharing against the controller's cheating.
Quantum Inf. Process., 2013

Erratum to: Multi-party quantum key agreement with Bell states and Bell measurements.
Quantum Inf. Process., 2013

Multi-party quantum key agreement with bell states and bell measurements.
Quantum Inf. Process., 2013

2012
Multiparty quantum secret sharing with the pure entangled two-photon states.
Quantum Inf. Process., 2012

A novel anonymous secret sharing scheme based on BP Artificial Neural Network.
Proceedings of the Eighth International Conference on Natural Computation, 2012

Secure two-party computation of the quadratic function's extreme minimal value.
Proceedings of the 9th International Conference on Fuzzy Systems and Knowledge Discovery, 2012

2011
Multi-party quantum state sharing of an arbitrary two-qubit state with Bell states.
Quantum Inf. Process., 2011

Asymmetric multi-party quantum state sharing of an arbitrary <i>m</i>-qubit state.
Quantum Inf. Process., 2011

An Efficient Multiparty Quantum Secret Sharing with Pure Entangled Two Photon States.
Proceedings of the Advances in Computer Science, Environment, Ecoinformatics, and Education, 2011

A Protocol of Privacy-Preserving Closest Pair in Two Dimensional Space.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

2010
A Secure Scheme for Data Statistics.
Proceedings of the International Conference on E-Business and E-Government, 2010

2008
An Efficient (t, n)-Threshold Multi-Secret Sharing Scheme.
Proceedings of the International Workshop on Knowledge Discovery and Data Mining, 2008

A Threshold Multi-secret Sharing Scheme.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2008

2007
Secure Two-Party Point-Circle Inclusion Problem.
J. Comput. Sci. Technol., 2007

A (t, n)-threshold verified multi-secret sharing scheme based on ECDLP.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

2005
An Efficient Multiple-Precision Division Algorithm.
Proceedings of the Sixth International Conference on Parallel and Distributed Computing, 2005


  Loading...