Lei Zhang

According to our database1, Lei Zhang authored at least 46 papers between 2007 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2018
Secure intelligent traffic light control using fog computing.
Future Generation Comp. Syst., 2018

Enabling Robust and Privacy-Preserving Resource Allocation in Fog Computing.
IEEE Access, 2018

2017
OTIBAAGKA: A New Security Tool for Cryptographic Mix-Zone Establishment in Vehicular Ad Hoc Networks.
IEEE Trans. Information Forensics and Security, 2017

Sender dynamic, non-repudiable, privacy-preserving and strong secure group communication protocol.
Inf. Sci., 2017

Certificateless and identity-based authenticated asymmetric group key agreement.
Int. J. Inf. Sec., 2017

2016
Privacy-Preserving Public Auditing Protocol for Low-Performance End Devices in Cloud.
IEEE Trans. Information Forensics and Security, 2016

2015
Round-Efficient and Sender-Unrestricted Dynamic Group Key Agreement Protocol for Secure Group Communications.
IEEE Trans. Information Forensics and Security, 2015

Practical secure and privacy-preserving scheme for value-added applications in VANETs.
Computer Communications, 2015

2014
Signatures in hierarchical certificateless cryptography: Efficient constructions and provable security.
Inf. Sci., 2014

Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts.
Inf. Sci., 2014

Provably Secure Certificateless Authenticated Asymmetric Group Key Agreement.
Proceedings of the Information Security Practice and Experience, 2014

Who Is Touching My Cloud.
Proceedings of the Computer Security - ESORICS 2014, 2014

Security Enhanced Anonymous Remote User Authentication and Key Agreement for Cloud Computing.
Proceedings of the 17th IEEE International Conference on Computational Science and Engineering, 2014

2013
Fast Transmission to Remote Cooperative Groups: A New Key Management Paradigm.
IEEE/ACM Trans. Netw., 2013

Identity-based optimistic fair exchange in the standard model.
Security and Communication Networks, 2013

Corrigendum: "Provably-secure electronic cash based on certicateless partially-blind signatures".
Electronic Commerce Research and Applications, 2013

Secure One-to-Group Communications Escrow-Free ID-Based Asymmetric Group Key Agreement.
Proceedings of the Information Security and Cryptology - 9th International Conference, 2013

A Generic Construction of Proxy Signatures from Certificateless Signatures.
Proceedings of the 27th IEEE International Conference on Advanced Information Networking and Applications, 2013

2012
Delegation of signing rights using certificateless proxy signatures.
Inf. Sci., 2012

Provably secure threshold public-key encryption with adaptive security and short ciphertexts.
Inf. Sci., 2012

Practical Privacy for Value-Added Applications in Vehicular Ad Hoc Networks.
Proceedings of the Internet and Distributed Computing Systems, 2012

2011
Provably secure one-round identity-based authenticated asymmetric group key agreement protocol.
Inf. Sci., 2011

Provably-secure electronic cash based on certificateless partially-blind signatures.
Electronic Commerce Research and Applications, 2011

Asymmetric group key agreement protocol for open networks and its application to broadcast encryption.
Computer Networks, 2011

Fully Distributed Broadcast Encryption.
Proceedings of the Provable Security - 5th International Conference, 2011

APPA: Aggregate Privacy-Preserving Authentication in Vehicular Ad Hoc Networks.
Proceedings of the Information Security, 14th International Conference, 2011

Preserving Security and Privacy in Large-Scale VANETs.
Proceedings of the Information and Communications Security - 13th International Conference, 2011

Bridging Broadcast Encryption and Group Key Agreement.
Proceedings of the Advances in Cryptology - ASIACRYPT 2011, 2011

2010
A Scalable Robust Authentication Protocol for Secure Vehicular Communications.
IEEE Trans. Vehicular Technology, 2010

Simulatable certificateless two-party authenticated key agreement protocol.
Inf. Sci., 2010

Certificateless threshold signature scheme from bilinear maps.
Inf. Sci., 2010

Efficient many-to-one authentication with certificateless aggregate signatures.
Computer Networks, 2010

Secure compression of privacy-preserving witnesses in vehicular ad hoc networks.
Proceedings of the IEEE 6th International Conference on Wireless and Mobile Computing, 2010

Threshold Public-Key Encryption with Adaptive Security and Short Ciphertexts.
Proceedings of the Information and Communications Security - 12th International Conference, 2010

Authenticated Asymmetric Group Key Agreement Protocol and Its Application.
Proceedings of IEEE International Conference on Communications, 2010

Hierarchical Certificateless Signatures.
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010

Identity-Based Authenticated Asymmetric Group Key Agreement Protocol.
Proceedings of the Computing and Combinatorics, 16th Annual International Conference, 2010

Ad hoc broadcast encryption.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

2009
A new certificateless aggregate signature scheme.
Computer Communications, 2009

Identity-Based Verifiably Encrypted Signatures without Random Oracles.
Proceedings of the Provable Security, Third International Conference, 2009

Novel Efficient Certificateless Aggregate Signatures.
Proceedings of the Applied Algebra, 2009

Certificateless One-Way Authenticated Two-Party Key Agreement Protocol.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2008
A New Provably Secure Certificateless Signature Scheme.
Proceedings of IEEE International Conference on Communications, 2008

Security Model for Certificateless Aggregate Signature Schemes.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008

2007
A Provably Secure Ring Signature Scheme in Certificateless Cryptography.
Proceedings of the Provable Security, 2007

New Efficient Certificateless Signature Scheme.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2007


  Loading...