Hongfeng Zhu

Orcid: 0000-0002-5137-6177

According to our database1, Hongfeng Zhu authored at least 77 papers between 2006 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A hybrid dynamic n-party quantum key exchange protocol based on three-particle GHZ states.
Quantum Inf. Process., March, 2024

2023
Drivers of the VR technologies user behaviour in e-commerce during the COVID-19 pandemic.
Electron. Commer. Res. Appl., November, 2023

2022
An Efficient Double-Offloading Biometric Authentication Scheme Based on Blockchain for Cross Domain Environment.
Wirel. Pers. Commun., 2022

Scalable multiple GHZ states equations and its applications in efficient quantum key agreement.
Quantum Inf. Process., 2022

Security analysis and improvements of a universal construction for a round-optimal password authenticated key exchange protocol.
Int. J. Inf. Comput. Secur., 2022

A <i>N</i>-party authenticated group key distribution protocol using quantum-reflection architecture.
Int. J. Inf. Comput. Secur., 2022

2021
One-round semi-quantum-honest key agreement scheme in MSTSA structure without entanglement.
Quantum Inf. Process., 2021

Quantum sealed-bid auction protocol for simultaneous ascending auction with GHZ states.
Quantum Inf. Process., 2021

Verifiable user quantum session key agreement protocol for smart home environment.
Quantum Inf. Process., 2021

Three-level quantum satellite communication framework and its applications.
Int. J. Satell. Commun. Netw., 2021

2020
An efficient quantum identity authentication key agreement protocol without entanglement.
Quantum Inf. Process., 2020

Semi-quantum-honest key agreement scheme with three-particle entangled states in cross-realm setting.
Quantum Inf. Process., 2020

Two novel semi-quantum-reflection protocols applied in connected vehicle systems with blockchain.
Comput. Electr. Eng., 2020

2019
An Automatically Iterated One-Time Basis Authenticated Scheme Against Relay Attack.
Wirel. Pers. Commun., 2019

A Three-Party Dynamic Identity-Based Authenticated Key Exchange Protocol with Forward Anonymity.
Wirel. Pers. Commun., 2019

An Enhanced RFID Mutual Authentication Protocol based on Quantum Dynamic Basis.
J. Inf. Hiding Multim. Signal Process., 2019

A simplified deniable authentication scheme in cloud-based pay-TV system with privacy protection.
Int. J. Commun. Syst., 2019

Lung image segmentation by generative adversarial networks.
CoRR, 2019

2018
Provably Secure and Password-Authenticated Hybrid Key Agreement Protocol in Two-realm with Privacy-Protection.
J. Inf. Hiding Multim. Signal Process., 2018

A Novel Two-party Password-Authenticated Key Retrieval Scheme.
J. Inf. Hiding Multim. Signal Process., 2018

A Lightweight RFID Authentication Protocol using Qubits against Relay Attack.
J. Inf. Hiding Multim. Signal Process., 2018

Provably Secure and Distributed Authenticated Quantum Key Agreement Protocol with User-Privacy using Dynamic Basis.
J. Inf. Hiding Multim. Signal Process., 2018

Provably Secure and Password-Authenticated Quantum Key Agreement Protocol with Dynamic Basis.
J. Inf. Hiding Multim. Signal Process., 2018

A Survey to Design Privacy Preserving Protocol Using Chaos Cryptography.
Int. J. Netw. Secur., 2018

Provably Secure and Repeatable Authenticated Privacy-Protection Scheme Using Chaotic Maps with Distributed Architecture.
Int. J. Netw. Secur., 2018

2017
An Efficient Chaotic Maps-Based Deniable Authentication Group Key Agreement Protocol.
Wirel. Pers. Commun., 2017

Multi-party Password-Authenticated Key Exchange Scheme with Privacy Preserving using Chaotic Maps in Random Oracle Model.
J. Inf. Hiding Multim. Signal Process., 2017

Simple and Universal Construction for Round-Optimal Password Authenticated Key Exchange towards Quantum-Resistant.
J. Inf. Hiding Multim. Signal Process., 2017

Enhancing The Security of Chaotic Maps-based Password-Authenticated Key agreement Using Smart Card.
J. Inf. Hiding Multim. Signal Process., 2017

A Novel Two-party Scheme against Off-line Password Guessing Attacks using New Theorem of Chaotic maps.
KSII Trans. Internet Inf. Syst., 2017

An Improved Two-party Password-Authenticated Key Agreement Protocol with Privacy Protection Based on Chaotic Maps.
Int. J. Netw. Secur., 2017

A Novel and Concise Multi-receiver Protocol Based on Chaotic Maps with Privacy Protection.
Int. J. Netw. Secur., 2017

Two-phase Commit with Security Services: Using Distinctive Proofs to Relieve Fragile Communications.
Int. J. Netw. Secur., 2017

2016
A Novel On-Demand Password Scheme Based on BAN Logic.
J. Inf. Hiding Multim. Signal Process., 2016

A Multi-server Authenticated Key Agreement Protocol with Privacy preserving Based on Chaotic Maps in Random Oracle Model.
J. Inf. Hiding Multim. Signal Process., 2016

A Password-Authenticated Key Exchange Scheme Using Chaotic Maps towards Multiple Servers to Server.
J. Inf. Hiding Multim. Signal Process., 2016

An Enhanced Dragonfly Key Exchange Protocol Using Chaotic Maps.
J. Inf. Hiding Multim. Signal Process., 2016

An Efficient Human-Verifiable Key Agreement Scheme with Privacy Preserving with Human Bond Communication for Mobile Devices.
J. Inf. Hiding Multim. Signal Process., 2016

A Novel and Provable Authenticated Key Agreement Protocol with Privacy Protection Based on Chaotic Maps towards Mobile Network.
Int. J. Netw. Secur., 2016

A Provably Password Authenticated Key Exchange Scheme Based on Chaotic Maps in Different Realm.
Int. J. Netw. Secur., 2016

Password-Authenticated Key Exchange Scheme Using Chaotic Maps towards a New Architecture in Standard Model.
Int. J. Netw. Secur., 2016

A Novel One-Time Identity-Password Authenticated Scheme Based on Biometrics for E-coupon System.
Int. J. Netw. Secur., 2016

Provably Secure Multi-server Privacy-Protection System Based on Chebyshev Chaotic Maps without Using Symmetric Cryptography.
Int. J. Netw. Secur., 2016

A Novel Biometrics-based One-Time Commitment Authenticated Key Agreement Scheme with Privacy Protection for Mobile Network.
Int. J. Netw. Secur., 2016

Secure Chaotic Maps-based Group Key Agreement Scheme with Privacy Preserving.
Int. J. Netw. Secur., 2016

2015
Cryptanalysis and Improvement of a Mobile Dynamic ID Authenticated Key Agreement Scheme Based on Chaotic Maps.
Wirel. Pers. Commun., 2015

Flexible and Password-Authenticated Key Agreement Scheme Based on Chaotic Maps for Multiple Servers to Server Architecture.
Wirel. Pers. Commun., 2015

Cryptanalysis and provable improvement of a chaotic maps-based mobile dynamic ID authenticated key agreement scheme.
Secur. Commun. Networks, 2015

One-time identity-password authenticated key agreement scheme based on biometrics.
Secur. Commun. Networks, 2015

A One-Way Authentication Key Agreement Scheme with User Anonymity Based on Chaotic maps towards Multi-Server Architecture.
J. Inf. Hiding Multim. Signal Process., 2015

Enhanced Graphical Captcha Framework and Applications to Strong Security Authenticated Scheme without Password Table.
J. Inf. Hiding Multim. Signal Process., 2015

A Novel Client-to-Client Password-Authenticated Key Exchange Protocol using Chaotic Maps in the Standard Model.
J. Inf. Hiding Multim. Signal Process., 2015

An Effcient and Secure Biometrics-based One-Time Identity-Password Authenticated Scheme for E-coupon System towards Mobile Internet.
J. Inf. Hiding Multim. Signal Process., 2015

Three-party Authentication Key Agreement Protocol Based on Chaotic Maps in the Standard Model with Privacy Preserving.
J. Inf. Hiding Multim. Signal Process., 2015

Robust Biometrics-based Key Agreement Scheme with Smart Cards towards a New Architecture.
J. Inf. Hiding Multim. Signal Process., 2015

A biometrics-based multi-server key agreement scheme on chaotic maps cryptosystem.
J. Inf. Hiding Multim. Signal Process., 2015

An Effcient Authenticated Key Agreement Protocol Based on Chaotic Maps with Privacy Protection using Smart Card.
J. Inf. Hiding Multim. Signal Process., 2015

A Provable One-way Authentication Key Agreement Scheme with User Anonymity for Multi-server Environment.
KSII Trans. Internet Inf. Syst., 2015

2014
Elliptic Curve Isogenies-Based Three-party Password Authenticated Key Agreement Scheme towards Quantum-Resistant.
J. Inf. Hiding Multim. Signal Process., 2014

Structured and Efficient Password-Based Group Key Agreement Protocol.
J. Inf. Hiding Multim. Signal Process., 2014

A Multi-function Password Mutual Authentication Key Agreement Scheme with privacy preserving.
J. Inf. Hiding Multim. Signal Process., 2014

2013
Robust and Simple N-Party Entangled Authentication Cloud Storage Protocol Based on Secret Sharing Scheme.
J. Inf. Hiding Multim. Signal Process., 2013

2010
A Robust and Efficient Password-authenticated Key Agreement Scheme without Verification Table Based on Elliptic Curve Cryptosystem.
Proceedings of the International Conference on Computational Aspects of Social Networks, 2010

Improving Network Security and Performance by Multipath Routing in Ad Hoc Networks.
Proceedings of the International Conference on Computational Aspects of Social Networks, 2010

A Novel Method to Characterize Unwanted Email Traffic.
Proceedings of the International Conference on Computational Aspects of Social Networks, 2010

An ID-based Multi-server Authentication with Key Agreement Scheme without Verification Table on Elliptic Curve Cryptosystem.
Proceedings of the International Conference on Computational Aspects of Social Networks, 2010

An Improved Tree-Based Distribution Group Key Agreement Protocol.
Proceedings of the International Conference on Computational Aspects of Social Networks, 2010

Application of Trusted Boundary Based on Port Trust Value in Campus Area Network.
Proceedings of the International Conference on Computational Aspects of Social Networks, 2010

2009
An Efficient Concealment Searching Model in P2P Network.
Proceedings of the 9th International Conference on Hybrid Intelligent Systems (HIS 2009), 2009

Robust and Simple Multi-server Authentication Protocol without Verification Table.
Proceedings of the 9th International Conference on Hybrid Intelligent Systems (HIS 2009), 2009

2008
EV-C2C-PAKE: An improved client-to-client password-authenticated key exchange protocol.
Comput. Syst. Sci. Eng., 2008

The Design and Implementation of Zero-Copy for Linux.
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008

2007
An Efficient Client-to-Client Password-Authenticated Key Exchange Resilient to Server Compromise.
Proceedings of the 13th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2007), 2007

A Method for Making Three-Party Password-Based Key Exchange Resilient to Server Compromise.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

Design and Simulation of VHDL based ARP Cache.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

2006
Research and Implementation of Zero-Copy Technology Based on Device Driver in Linux.
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006

A New Method of TOE Architecture Based on the ML403 Development Board in Linux.
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006


  Loading...