According to our database1, Lei Zhang authored at least 48 papers between 2007 and 2018.
Legend:Book In proceedings Article PhD thesis Other
Secure intelligent traffic light control using fog computing.
Future Generation Comp. Syst., 2018
Enabling Robust and Privacy-Preserving Resource Allocation in Fog Computing.
IEEE Access, 2018
OTIBAAGKA: A New Security Tool for Cryptographic Mix-Zone Establishment in Vehicular Ad Hoc Networks.
IEEE Trans. Information Forensics and Security, 2017
Sender dynamic, non-repudiable, privacy-preserving and strong secure group communication protocol.
Inf. Sci., 2017
Certificateless and identity-based authenticated asymmetric group key agreement.
Int. J. Inf. Sec., 2017
A Provably Secure Ring Signature Scheme in Certificateless Cryptography.
Privacy-Preserving Public Auditing Protocol for Low-Performance End Devices in Cloud.
IEEE Trans. Information Forensics and Security, 2016
Round-Efficient and Sender-Unrestricted Dynamic Group Key Agreement Protocol for Secure Group Communications.
IEEE Trans. Information Forensics and Security, 2015
On the Security of MTA-OTIBASs (Multiple-TA One-Time Identity-Based Aggregate Signatures).
On the Security of Privacy-Preserving Vehicular Communication Authentication with Hierarchical Aggregation and Fast Response.
Practical secure and privacy-preserving scheme for value-added applications in VANETs.
Computer Communications, 2015
Signatures in hierarchical certificateless cryptography: Efficient constructions and provable security.
Inf. Sci., 2014
Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts.
Inf. Sci., 2014
Provably Secure Certificateless Authenticated Asymmetric Group Key Agreement.
Proceedings of the Information Security Practice and Experience, 2014
Who Is Touching My Cloud.
Proceedings of the Computer Security - ESORICS 2014, 2014
Security Enhanced Anonymous Remote User Authentication and Key Agreement for Cloud Computing.
Proceedings of the 17th IEEE International Conference on Computational Science and Engineering, 2014
Fast Transmission to Remote Cooperative Groups: A New Key Management Paradigm.
IEEE/ACM Trans. Netw., 2013
Identity-based optimistic fair exchange in the standard model.
Security and Communication Networks, 2013
Corrigendum: "Provably-secure electronic cash based on certicateless partially-blind signatures".
Electronic Commerce Research and Applications, 2013
Secure One-to-Group Communications Escrow-Free ID-Based Asymmetric Group Key Agreement.
Proceedings of the Information Security and Cryptology - 9th International Conference, 2013
A Generic Construction of Proxy Signatures from Certificateless Signatures.
Proceedings of the 27th IEEE International Conference on Advanced Information Networking and Applications, 2013
Delegation of signing rights using certificateless proxy signatures.
Inf. Sci., 2012
Provably secure threshold public-key encryption with adaptive security and short ciphertexts.
Inf. Sci., 2012
Practical Privacy for Value-Added Applications in Vehicular Ad Hoc Networks.
Proceedings of the Internet and Distributed Computing Systems, 2012
Provably secure one-round identity-based authenticated asymmetric group key agreement protocol.
Inf. Sci., 2011
Provably-secure electronic cash based on certificateless partially-blind signatures.
Electronic Commerce Research and Applications, 2011
Asymmetric group key agreement protocol for open networks and its application to broadcast encryption.
Computer Networks, 2011
Fully Distributed Broadcast Encryption.
Proceedings of the Provable Security - 5th International Conference, 2011
APPA: Aggregate Privacy-Preserving Authentication in Vehicular Ad Hoc Networks.
Proceedings of the Information Security, 14th International Conference, 2011
Preserving Security and Privacy in Large-Scale VANETs.
Proceedings of the Information and Communications Security - 13th International Conference, 2011
Bridging Broadcast Encryption and Group Key Agreement.
Proceedings of the Advances in Cryptology - ASIACRYPT 2011, 2011
A Scalable Robust Authentication Protocol for Secure Vehicular Communications.
IEEE Trans. Vehicular Technology, 2010
Simulatable certificateless two-party authenticated key agreement protocol.
Inf. Sci., 2010
Certificateless threshold signature scheme from bilinear maps.
Inf. Sci., 2010
Identity-Based Authenticated Asymmetric Group Key Agreement Protocol.
IACR Cryptology ePrint Archive, 2010
Efficient many-to-one authentication with certificateless aggregate signatures.
Computer Networks, 2010
Secure compression of privacy-preserving witnesses in vehicular ad hoc networks.
Proceedings of the IEEE 6th International Conference on Wireless and Mobile Computing, 2010
Threshold Public-Key Encryption with Adaptive Security and Short Ciphertexts.
Proceedings of the Information and Communications Security - 12th International Conference, 2010
Authenticated Asymmetric Group Key Agreement Protocol and Its Application.
Proceedings of IEEE International Conference on Communications, 2010
Hierarchical Certificateless Signatures.
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010
Ad hoc broadcast encryption.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
A new certificateless aggregate signature scheme.
Computer Communications, 2009
Identity-Based Verifiably Encrypted Signatures without Random Oracles.
Proceedings of the Provable Security, Third International Conference, 2009
Novel Efficient Certificateless Aggregate Signatures.
Proceedings of the Applied Algebra, 2009
Certificateless One-Way Authenticated Two-Party Key Agreement Protocol.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
A New Provably Secure Certificateless Signature Scheme.
Proceedings of IEEE International Conference on Communications, 2008
Security Model for Certificateless Aggregate Signature Schemes.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008
New Efficient Certificateless Signature Scheme.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2007