Mingwu Zhang

According to our database1, Mingwu Zhang authored at least 96 papers between 2007 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
On the Soundness and Security of Privacy-Preserving SVM for Outsourcing Data Classification.
IEEE Trans. Dependable Sec. Comput., 2018

After-the-Fact Leakage-Resilient Identity-Based Authenticated Key Exchange.
IEEE Systems Journal, 2018

A Semi-Automatic Annotation Method of Effect Clue Words for Chinese Patents Based on Co-Training.
IJDWM, 2018

Accountable mobile E-commerce scheme in intelligent cloud system transactions.
J. Ambient Intelligence and Humanized Computing, 2018

Secure and Fine-grained Electricity Consumption Aggregation Scheme for Smart Grid.
TIIS, 2018

Certificate-based Smooth Projective Hashing and Its Applications.
I. J. Network Security, 2018

A publicly verifiable network coding scheme with null-space HMAC.
IJIIDS, 2018

ADR-lrABE: New Mechanism of Direct-revocable Attribute-Based Encryption with Continual-leakage Tolerances.
Fundam. Inform., 2018

An Ensemble Method based on Selection Using Bat Algorithm for Intrusion Detection.
Comput. J., 2018

Secure searchable public key encryption against insider keyword guessing attacks from indistinguishability obfuscation.
SCIENCE CHINA Information Sciences, 2018

Tolerating Sensitive-Leakage With Larger Plaintext-Space and Higher Leakage-Rate in Privacy-Aware Internet-of-Things.
IEEE Access, 2018

Consecutive Leakage-Resilient and Updatable Lossy Trapdoor Functions and Application in Sensitive Big-Data Environments.
IEEE Access, 2018

Secure and Membership-Based Data Sharing Scheme in V2G Networks.
IEEE Access, 2018

An Efficient and Provably Secure Private Polynomial Evaluation Scheme.
Proceedings of the Information Security Practice and Experience, 2018

Cloud-Based Data-Sharing Scheme Using Verifiable and CCA-Secure Re-encryption from Indistinguishability Obfuscation.
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018

Verifiable Secret Sharing Based on Hyperplane Geometry with Its Applications to Optimal Resilient Proactive Cryptosystems.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018

Secure Publicly Verifiable Computation with Polynomial Commitment in Cloud Computing.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018

2017
Efficient Privacy-Preserving Cube-Data Aggregation Scheme for Smart Grids.
IEEE Trans. Information Forensics and Security, 2017

Attribute-Based Hash Proof System Under Learning-With-Errors Assumption in Obfuscator-Free and Leakage-Resilient Environments.
IEEE Systems Journal, 2017

Efficiently Obfuscating Anonymous Re-encryption Functionality with Average-Case Virtual Black-Box Security.
J. Inf. Sci. Eng., 2017

Privacy-preserving Outsourcing Schemes of Modular Exponentiations Using Single Untrusted Cloud Server.
TIIS, 2017

Continuous Leakage Resilient Lossy Trapdoor Functions.
Information, 2017

New efficient chosen ciphertext secure Elgamal encryption schemes for secure Cloud storage service.
IJWGS, 2017

Cost-effective secure E-health cloud system using identity based cryptographic techniques.
Future Generation Comp. Syst., 2017

Obfuscating Re-encryption Algorithm With Flexible and Controllable Multi-Hop on Untrusted Outsourcing Server.
IEEE Access, 2017

Provably Leakage-Resilient Password-Based Authenticated Key Exchange in the Standard Model.
IEEE Access, 2017

Reliable Homomorphic Matrix Disguising Scheme.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2017

Leakage-Resilient Password-Based Authenticated Key Exchange.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2017

An Efficient Identity-Based Homomorphic Signature Scheme for Network Coding.
Proceedings of the Advances in Internetworking, 2017

2016
Continual key leakage tolerant encryption from extensible set delegation.
Security and Communication Networks, 2016

Strongly average-case secure obfuscation: achieving input privacy and circuit obscurity.
Security and Communication Networks, 2016

Realizing secret sharing with general access structure.
Inf. Sci., 2016

An efficient resource-fair commit-prove-fair-open protocol.
IJESDF, 2016

Privacy-friendly weighted-reputation aggregation protocols against malicious adversaries in cloud services.
Int. J. Communication Systems, 2016

An error-tolerant keyword search scheme based on public-key encryption in secure cloud computing.
Concurrency and Computation: Practice and Experience, 2016

Token-Leakage Tolerant and Vector Obfuscated IPE and Application in Privacy-Preserving Two-Party Point/Polynomial Evaluations.
Comput. J., 2016

Updatable Lossy Trapdoor Functions and Its Application in Continuous Leakage.
Proceedings of the Provable Security, 2016

Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016

One-Round Strong Oblivious Signature-Based Envelope.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
Efficient Public Key Encryption With Equality Test Supporting Flexible Authorization.
IEEE Trans. Information Forensics and Security, 2015

Security analysis of a homomorphic signature scheme for network coding.
Security and Communication Networks, 2015

Notes on Proxy Signcryption and Multi-proxy Signature Schemes.
I. J. Network Security, 2015

Functional Encryption Resilient to Hard-to-Invert Leakage.
Comput. J., 2015

Public Key Encryption with Delegated Equality Test in a Multi-User Setting.
Comput. J., 2015

Insecurity of an Efficient Identity-Based Proxy Signature in the Standard Model.
Comput. J., 2015

Program Obfuscator for Privacy-Carrying Unidirectional One-hop Re-encryption.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

2014
LR-FEAD: leakage-tolerating and attribute-hiding functional encryption mechanism with delegation in affine subspaces.
The Journal of Supercomputing, 2014

Unbounded anonymous hierarchical IBE with continual-key-leakage tolerance.
Security and Communication Networks, 2014

An efficient fair UC-secure protocol for two-party computation.
Security and Communication Networks, 2014

PPGJ: A privacy-preserving general join for outsourced encrypted database.
Security and Communication Networks, 2014

Anonymous spatial encryption under affine space delegation functionality with full security.
Inf. Sci., 2014

CCLAS: A Practical and Compact Certificateless Aggregate Signature with Share Extraction.
I. J. Network Security, 2014

Comments on FHH Anonymous Multireceiver Encryption.
I. J. Network Security, 2014

Fully secure constructions of spatial encryption with vector privacy.
Int. J. Communication Systems, 2014

Anonymous encryption with partial-order subset delegation and its application in privacy email systems.
IET Information Security, 2014

Key continual-leakage resilient broadcast cryptosystem from dual system in broadcast networks.
Frontiers Comput. Sci., 2014

ACP-lrFEM: Functional Encryption Mechanism with Automatic Control Policy in the Presence of Key Leakage.
Proceedings of the Information Security Practice and Experience, 2014

New Model and Construction of ABE: Achieving Key Resilient-Leakage and Attribute Direct-Revocation.
Proceedings of the Information Security and Privacy - 19th Australasian Conference, 2014

2013
Efficient Constructions of Anonymous Multireceiver Encryption Protocol and Their Deployment in Group E-mail Systems With Privacy Preservation.
IEEE Systems Journal, 2013

Efficient and adaptively secure broadcast encryption systems.
Security and Communication Networks, 2013

Identity-based partially blind signature in the standard model for electronic cash.
Mathematical and Computer Modelling, 2013

Public Key Replacement and Universal Forgery of a SCLS Scheme.
I. J. Network Security, 2013

Leakage-resilient Attribute-based Encryptions with Fast Decryption: Model, Analysis and Construction.
IACR Cryptology ePrint Archive, 2013

Bounded Leakage-Resilient Functional Encryption with Hidden Vector Predicate.
Comput. J., 2013

Leakage-Resilient Attribute-Based Encryption with Fast Decryption: Models, Analysis and Constructions.
Proceedings of the Information Security Practice and Experience, 2013

2012
Reconciling and improving of multi-receiver signcryption protocols with threshold decryption.
Security and Communication Networks, 2012

Privacy-Preserving OLAP for Accurate Answer.
Journal of Circuits, Systems, and Computers, 2012

An ID-based cryptographic mechanisms based on GDLP and IFP.
Inf. Process. Lett., 2012

Cryptanalysis of Strong Designated Verifier Signature Scheme with Non-delegatability and Non-transferability.
IEICE Transactions, 2012

Analysis and Improvement of a Secret Broadcast with Binding Encryption in Broadcasting Networks.
IEICE Transactions, 2012

Combining AHP with GIS in synthetic evaluation of environmental suitability for living in China's 35 major cities.
International Journal of Geographical Information Science, 2012

Efficient signcryption in the standard model.
Concurrency and Computation: Practice and Experience, 2012

LR-UESDE: A Continual-Leakage Resilient Encryption with Unbounded Extensible Set Delegation.
Proceedings of the Provable Security - 6th International Conference, 2012

A Robust Fuzzy Extractor without ECCs.
Proceedings of the Information Security and Cryptology - 8th International Conference, 2012

2011
Group-oriented setting's multisigncryption scheme with threshold designcryption.
Inf. Sci., 2011

Multibiometric Based Secure Encryption, Authentication Scheme with Fuzzy Extractor.
I. J. Network Security, 2011

Cryptanalysis and Fixed of Short Signature Scheme without Random Oracle from Bilinear Parings.
I. J. Network Security, 2011

Anonymous Encryption with Partial-Order Subset Delegation Functionality.
Proceedings of the Provable Security - 5th International Conference, 2011

Efficient Identity-Based Signcryption in the Standard Model.
Proceedings of the Provable Security - 5th International Conference, 2011

Dual-Verifiers DVS with Message Recovery for Tolerant Routing in Wireless Sensor Networks.
Proceedings of the Intelligence and Security Informatics - Pacific Asia Workshop, 2011

GeoEnc: Geometric Area Based Keys and Policies in Functional Encryption Systems.
Proceedings of the Information Security and Privacy - 16th Australasian Conference, 2011

2010
A Classified Credential Selection Scheme with Disclosure-minimizing Privacy.
JDCTA, 2010

Fuzzy Biometric Signcryption Scheme with Bilinear Pairings in the Standard Model.
Proceedings of the Intelligence and Security Informatics, Pacific Asia Workshop, 2010

Towards Confidentiality of ID-Based Signcryption Schemes under without Random Oracle Model.
Proceedings of the Intelligence and Security Informatics, Pacific Asia Workshop, 2010

2009
Ordered Semiring-based Trust Establish Model with Risk Evaluating.
I. J. Network Security, 2009

Analysis and Enhance of Anonymous Signcryption Scheme.
IACR Cryptology ePrint Archive, 2009

Analysis and Improvement of an ID-Based Anonymous Signcryption Model.
Proceedings of the Emerging Intelligent Computing Technology and Applications, 2009

2008
Interactive analysis of systems biology molecular expression data.
BMC Systems Biology, 2008

Efficient Secret Authenticatable Anonymous Signcryption Scheme with Identity Privacy.
Proceedings of the Intelligence and Security Informatics, 2008

Assertions Signcryption Scheme in Decentralized Autonomous Trust Environments.
Proceedings of the Autonomic and Trusted Computing, 5th International Conference, 2008

2007
Tracing Lineage Beyond Relational Operators.
Proceedings of the 33rd International Conference on Very Large Data Bases, 2007

Using Trust Metric to Detect Malicious Behaviors in WSNs.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

Trust-based Distributed Authentication Middleware in Ubiquitous Mobile Environments.
Proceedings of the Third International Conference on Natural Computation, 2007

Identifying Rare Classes with Sparse Training Data.
Proceedings of the Database and Expert Systems Applications, 18th International Conference, 2007

Tracing Lineage in Multi-version Scientific Databases.
Proceedings of the 7th IEEE International Conference on Bioinformatics and Bioengineering, 2007

Efficient Identity-Based Signcryption Scheme for Multiple Receivers.
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007


  Loading...