Huawei Zhao

According to our database1, Huawei Zhao
  • authored at least 22 papers between 2003 and 2017.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2017
Key negotiation schemes for body sensor networks on the surface of the human body.
IJAACS, 2017

Lightweight Backup and Efficient Recovery Scheme for Health Blockchain Keys.
Proceedings of the 13th IEEE International Symposium on Autonomous Decentralized System, 2017

Design of Network Media's Digital Rights Management Scheme Based on Blockchain Technology.
Proceedings of the 13th IEEE International Symposium on Autonomous Decentralized System, 2017

Random Walk Based Trade Reference Computation for Personal Credit Scoring.
Proceedings of the 13th IEEE International Symposium on Autonomous Decentralized System, 2017

2016
Forward-Secure Identity-Based Signature Scheme in Untrusted Update Environments.
Wireless Personal Communications, 2016

Physiological-signal-based key negotiation protocols for body sensor networks: A survey.
Simulation Modelling Practice and Theory, 2016

IRIBE: Intrusion-resilient identity-based encryption.
Inf. Sci., 2016

2015
A Trusted Mobile Payment Scheme Based on Body Area Networks.
EAI Endorsed Trans. Indust. Netw. & Intellig. Syst., 2015

Securing Body Sensor Networks with Biometric Methods: A New Key Negotiation Method and a Key Sampling Method for Linear Interpolation Encryption.
IJDSN, 2015

Physiological-Signal-Based Key Negotiation Protocols for Body Sensor Networks: A Survey.
Proceedings of the Twelfth IEEE International Symposium on Autonomous Decentralized Systems, 2015

2014
A new Lagrange solution to the privacy-preserving general geometric intersection problem.
J. Network and Computer Applications, 2014

A general transformation from KP-ABE to searchable encryption.
Future Generation Comp. Syst., 2014

2013
An Energy Efficient Key Management Scheme for Body Sensor Networks.
IEEE Trans. Parallel Distrib. Syst., 2013

A Key Management Scheme between Body Sensor Networks and the Base Station.
Proceedings of the Ninth International Conference on Computational Intelligence and Security, 2013

2012
Non-Interactive Forward-Secure Threshold Signature without Random Oracles.
J. Inf. Sci. Eng., 2012

Hashed Random Key Pre-distribution Scheme for Large Heterogeneous Sensor Networks.
Proceedings of the 11th IEEE International Conference on Trust, 2012

A Simultaneous Members Enrollment and Revocation Protocol for Secret Sharing Schemes.
Proceedings of the Intelligence and Security Informatics - Pacific Asia Workshop, 2012

A Hash Chains Based Key Management Scheme for Wireless Sensor Networks.
Proceedings of the Cyberspace Safety and Security - 4th International Symposium, 2012

A General Transformation from KP-ABE to Searchable Encryption.
Proceedings of the Cyberspace Safety and Security - 4th International Symposium, 2012

2010
k out of n Oblivious Transfer Protocols from Bilinear Pairings.
JSW, 2010

2008
Converters for Designing Applied Cryptographic Protocols.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008

2003
On the induced electric field gradients in the human body for magnetic stimulation by gradient coils in MRI.
IEEE Trans. Biomed. Engineering, 2003


  Loading...