Linchao Zhang

Orcid: 0000-0001-5016-2719

According to our database1, Linchao Zhang authored at least 19 papers between 2011 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Blockchain for applications of clinical trials: Taxonomy, challenges, and future directions.
IET Commun., 2022

2020
Anti-Leakage Client-Side Deduplication with Ownership Management in Fog Computing.
Int. J. Netw. Secur., 2020

2019
Secure deduplication of encrypted data in online and offline environments.
Int. J. High Perform. Comput. Netw., 2019

2018
Secure and Efficient Cloud Data Deduplication Supporting Dynamic Data Public Auditing.
Int. J. Netw. Secur., 2018

Secure Data Deduplication with Ownership Management and Sharing in Cloud Storage.
Proceedings of the Frontiers in Cyber Security - First International Conference, 2018

2017
Calantha: Content distribution across geo-distributed datacenters.
Proceedings of the 2017 IEEE Conference on Computer Communications Workshops, 2017

Privacy-Preserving Multi-authority Ciphertext-Policy Attribute-Based Encryption with Revocation.
Proceedings of the Advances on Broad-Band Wireless Computing, 2017

2016
Investigation of Interference Models for RFID Systems.
Sensors, 2016

Security Analysis and Improvement of A Collusion-Resistant Identity-Based Proxy Re-Encryption Scheme.
Proceedings of the Advances on Broad-Band Wireless Computing, 2016

2015
Reliable Communication in Wireless Networks.
PhD thesis, 2015

A novel simulator for RFID reader-to-reader anti-collision protocols.
Proceedings of the 2015 International EURASIP Workshop on RFID Technology, 2015

2014
Performance analysis of reliable flooding in duty-cycle wireless sensor networks.
Trans. Emerg. Telecommun. Technol., 2014

2013
Evaluation of single and additive interference models for RFID collisions.
Math. Comput. Model., 2013

Trade-off between maximum cardinality of collision sets and accuracy of RFID reader-to-reader collision detection.
EURASIP J. Embed. Syst., 2013

Simulation and Evaluation of the Interference Models for RFID Reader-to-Reader Collisions.
Proceedings of the 11th International Conference on Advances in Mobile Computing & Multimedia, 2013

Simulating Reader-to-Reader Interference in RFID Systems.
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013

2012
A Comparison between Single and Additive Contribution in RFID Reader-to-Reader Interference Models.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

2011
Performance evaluation of reliable and unreliable opportunistic flooding in wireless sensor network.
Proceedings of the 17th IEEE International Conference on Networks, 2011

Evaluation Framework of Opportunistic Flooding in Wireless Sensor Networks.
Proceedings of the IEEE/IFIP 9th International Conference on Embedded and Ubiquitous Computing, 2011


  Loading...