Lifeng Guo

Orcid: 0000-0001-6051-4634

According to our database1, Lifeng Guo authored at least 33 papers between 1997 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
If Some Critical Regions Achieve Carbon Neutrality, How Will the Global Atmospheric CO2 Concentration Change?
Remote. Sens., May, 2024

Integration of prognostic sowing and harvesting schemes to enhance crop dynamic growth simulation in Noah-MP-Crop model.
Ecol. Informatics, 2024

A Lightweight_PAEKS-based energy scheduling model considering priority in MicroGrid.
Ad Hoc Networks, 2024

2023
Online/Offline Rewritable Blockchain With Auditable Outsourced Computation.
IEEE Trans. Cloud Comput., 2023

Approximation algorithms for a virtual machine allocation problem with finite types.
Inf. Process. Lett., 2023

A New Revocable Attribute Based Encryption on Lattice.
Proceedings of the Provable and Practical Security, 2023

New Traceable and Revocable Attribute Based Encryption on Lattices.
Proceedings of the International Conference on Networking and Network Applications, 2023

Efficient Fine-Grained Forward Secure Encryption Scheme Based on Attributes in Mobile Healthcare.
Proceedings of the International Conference on Networking and Network Applications, 2023

2022
One-Time Rewritable Blockchain with Traitor Tracing and Bilateral Access Control.
Proceedings of the IEEE International Conference on Trust, 2022

2021
Assessment of Vegetation Dynamics and Ecosystem Resilience in the Context of Climate Change and Drought in the Horn of Africa.
Remote. Sens., 2021

TABE-DAC: Efficient Traceable Attribute-Based Encryption Scheme With Dynamic Access Control Based on Blockchain.
IEEE Access, 2021

2020
A Decryptable Attribute-Based Keyword Search Scheme on eHealth Cloud in Internet of Things Platforms.
IEEE Access, 2020

2019
Efficient Hierarchical Identity-Based Encryption System for Internet of Things Infrastructure.
Symmetry, 2019

Spatio-Temporal Analysis of Vegetation Dynamics as a Response to Climate Variability and Drought Patterns in the Semiarid Region, Eritrea.
Remote. Sens., 2019

Effects of the Temporal Aggregation and Meteorological Conditions on the Parameter Robustness of OCO-2 SIF-Based and LUE-Based GPP Models for Croplands.
Remote. Sens., 2019

Design of Programming Experiment Course Platform Based on MOOCs.
Int. J. Emerg. Technol. Learn., 2019

An Energy Scheduling Strategy With Priority Within Islanded Microgrids.
IEEE Access, 2019

2018
Retrieval of Daily PM<sub>2.5</sub> Concentrations Using Nonlinear Methods: A Case Study of the Beijing-Tianjin-Hebei Region, China.
Remote. Sens., 2018

2017
5-regular oriented graphs with optimum skew energy.
Appl. Math. Comput., 2017

2015
Efficient Secure-Channel Free Public Key Encryption with Keyword Search for EMRs in Cloud Storage.
J. Medical Syst., 2015

2014
Research on the Multilevel STATCOM based on the H-bridge Cascaded.
J. Networks, 2014

2013
An ID-Based Short Group Signature Scheme.
J. Softw., 2013

A Verifiable Proxy Re-encryption with Keyword Search without Random Oracle.
Proceedings of the Ninth International Conference on Computational Intelligence and Security, 2013

2012
Efficient bidirectional proxy re-encryption with direct chosen-ciphertext security.
Comput. Math. Appl., 2012

2011
ID-Based Sequential Aggregate Signatures.
J. Softw., 2011

2007
Insider attacks on multi-proxy multi-signature schemes.
Comput. Electr. Eng., 2007

Further Discussions on the Security of a Nominative Signature Scheme.
Proceedings of the 2007 International Conference on Security & Management, 2007

2006
Security Analysis and Improvement of Hsu et al. Threshold Proxy Signature Scheme.
Int. J. Netw. Secur., 2006

An Identity-based Mediated Signature Scheme from Bilinear Pairing.
Int. J. Netw. Secur., 2006

Further Discussions on the Security of a Nominative Signature Scheme.
IACR Cryptol. ePrint Arch., 2006

2004
Security of Wang-Li Threshold Signature Scheme.
IACR Cryptol. ePrint Arch., 2004

Cryptanalysis of Threshold-Multisignature schemes.
IACR Cryptol. ePrint Arch., 2004

1997
An Overview of JB (Jade Bird) Component Library System JBCL.
Proceedings of the TOOLS 1997: 24th International Conference on Technology of Object-Oriented Languages and Systems, 1997


  Loading...