Mingwu Zhang

Orcid: 0000-0001-8551-8826

According to our database1, Mingwu Zhang authored at least 191 papers between 2007 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
An Anonymous and Efficient Certificate-Based Identity Authentication Protocol for VANET.
IEEE Internet Things J., April, 2024

An Efficient and Secure Lightweight Certificateless Hybrid Signcryption Scheme.
IEEE Internet Things J., April, 2024

L-Net: A lightweight convolutional neural network for devices with low computing power.
Inf. Sci., March, 2024

Traceable and Privacy-Preserving Authentication Scheme for Energy Trading in V2G Networks.
IEEE Internet Things J., February, 2024

APLDP: Adaptive personalized local differential privacy data collection in mobile crowdsensing.
Comput. Secur., January, 2024

Efficient Noninteractive Polynomial Commitment Scheme in the Discrete Logarithm Setting.
IEEE Internet Things J., 2024

2023
A secure and lightweight batch authentication scheme for Internet of Drones environment.
Veh. Commun., December, 2023

An Efficient Certificateless Signature Scheme With Provably Security and Its Applications.
IEEE Syst. J., December, 2023

A Privacy-Preserving Trajectory Publishing Method Based on Multi-Dimensional Sub-Trajectory Similarities.
Sensors, December, 2023

Guest editorial: Special issue on frontiers in cyber security.
J. Syst. Archit., December, 2023

Efficient and privacy-preserving online diagnosis scheme based on federated learning in e-healthcare system.
Inf. Sci., November, 2023

Leakage-resilient identity-based cryptography from minimal assumptions.
Des. Codes Cryptogr., November, 2023

A Novel Construction Of Certificateless Aggregate Signature Scheme For Healthcare Wireless Medical Sensor Networks.
Comput. J., November, 2023

A redesigned secure and efficient data transaction protocol for mobile payment system.
J. Syst. Archit., October, 2023

An Efficient and Provably Secure Identity Authentication Scheme for VANET.
IEEE Internet Things J., October, 2023

A Privacy-Preserving Data Aggregation Scheme Based on Chinese Remainder Theorem in Mobile Crowdsensing System.
IEEE Syst. J., September, 2023

A secure and privacy-preserving word vector training scheme based on functional encryption with inner-product predicates.
Comput. Stand. Interfaces, August, 2023

Efficient Attribute-Based Signature With Collusion Resistance for Internet of Vehicles.
IEEE Trans. Veh. Technol., June, 2023

An Efficient Identity Authentication Scheme With Dynamic Anonymity for VANETs.
IEEE Internet Things J., June, 2023

Data release for machine learning via correlated differential privacy.
Inf. Process. Manag., May, 2023

A verifiable and privacy-preserving cloud mining pool selection scheme in blockchain of things.
Inf. Sci., April, 2023

Identity-Based Encryption With Continuous Leakage-Resilient CCA Security From Static Complexity Assumption.
Comput. J., April, 2023

An Efficient Identity Authentication Scheme With Provable Security and Anonymity for Mobile Edge Computing.
IEEE Syst. J., March, 2023

An Efficient Certificate-Based Aggregate Signature Scheme With Provable Security for Industrial Internet of Things.
IEEE Syst. J., March, 2023

TransFlow: a Snakemake workflow for transmission analysis of<i>Mycobacterium tuberculosis</i>whole-genome sequencing data.
Bioinform., January, 2023

Data-Matching-Based Privacy-Preserving Statistics and Its Applications in Digital Publishing Industry.
IEEE Trans. Serv. Comput., 2023

Privacy-Preserving Online Medical Prediagnosis Training Model Based on Soft-Margin SVM.
IEEE Trans. Serv. Comput., 2023

PrivacyEAFL: Privacy-Enhanced Aggregation for Federated Learning in Mobile Crowdsensing.
IEEE Trans. Inf. Forensics Secur., 2023

A Privacy-Preserving and Verifiable Statistical Analysis Scheme for an E-Commerce Platform.
IEEE Trans. Inf. Forensics Secur., 2023

Decision Tree Evaluation on Sensitive Datasets for Secure e-Healthcare Systems.
IEEE Trans. Dependable Secur. Comput., 2023

An Anonymous and Efficient Multimessage and Multireceiver Certificateless Signcryption Scheme for VANET.
IEEE Internet Things J., 2023

An Anonymous and Revocable Authentication Protocol for Vehicle-to-Vehicle Communications.
IEEE Internet Things J., 2023

A direct construction of continuous leakage-resilient (H)IBE scheme with CCA security from dual system encryption.
Comput. Stand. Interfaces, 2023

PPNNP: A privacy-preserving neural network prediction with separated data providers using multi-client inner-product encryption.
Comput. Stand. Interfaces, 2023

Privacy-preserving anomaly counting for time-series data in edge-assisted crowdsensing.
Comput. Stand. Interfaces, 2023

Multi-Keywords Searchable Attribute-Based Encryption With Verification and Attribute Revocation Over Cloud Data.
IEEE Access, 2023

Homomorphic Witness Encryption from Indistinguishable Obfuscation.
Proceedings of the Provable and Practical Security, 2023

2022
A Distributed and Privacy-Preserving Random Forest Evaluation Scheme with Fine Grained Access Control.
Symmetry, 2022

TPM-Based Conditional Privacy-Preserving Authentication Protocol in VANETs.
Symmetry, 2022

PPDDS: A Privacy-Preserving Disease Diagnosis Scheme Based on the Secure Mahalanobis Distance Evaluation Model.
IEEE Syst. J., 2022

A Secure Clinical Diagnosis With Privacy-Preserving Multiclass Support Vector Machine in Clouds.
IEEE Syst. J., 2022

Secure and Efficient Certificate-Based Proxy Signature Schemes for Industrial Internet of Things.
IEEE Syst. J., 2022

Improved Secure Transaction Scheme With Certificateless Cryptographic Primitives for IoT-Based Mobile Payments.
IEEE Syst. J., 2022

Measurement-device-independent quantum secure multiparty summation.
Quantum Inf. Process., 2022

SSBAS-FA: A secure sealed-bid e-auction scheme with fair arbitration based on time-released blockchain.
J. Syst. Archit., 2022

Privacy-Preserving federated learning in medical diagnosis with homomorphic re-Encryption.
Comput. Stand. Interfaces, 2022

Continuous Leakage-Amplified Public-Key Encryption With CCA Security.
Comput. J., 2022

A Secure Word Vector Training Scheme Based on Inner-Product Functional Encryption.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2022

A Privacy-Preserving Federated Learning with Mutual Verification on Vector Spaces.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2022

Witness Encryption from Smooth Projective Hashing System.
Proceedings of the Information Security - 25th International Conference, 2022

Bilateral Privacy-Preserving Task Assignment with Personalized Participant Selection for Mobile Crowdsensing.
Proceedings of the Information Security - 25th International Conference, 2022

Privacy-Preserving Multi-party Neural Network Learning Over Incomplete Data.
Proceedings of the 24th IEEE Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, 2022

SVFLS: A Secure and Verifiable Federated Learning Training Scheme.
Proceedings of the Frontiers in Cyber Security - 5th International Conference, 2022

A Multi-task Mobile Crowdsensing Scheme with Conditional Privacy Preserving for Vehicle Networks.
Proceedings of the Emerging Information Security and Applications, 2022

Time-Lock Encryption for Multiple Consecutive Periods and its Application.
Proceedings of the 7th IEEE International Conference on Data Science in Cyberspace, 2022

Structure-Preserving Linearly Homomorphic Signature with Designated Combiner for Subspace.
Proceedings of the Information Security and Privacy - 27th Australasian Conference, 2022

2021
Continuous leakage-resilient certificate-based signcryption scheme and application in cloud computing.
Theor. Comput. Sci., 2021

PPO-DFK: A Privacy-Preserving Optimization of Distributed Fractional Knapsack With Application in Secure Footballer Configurations.
IEEE Syst. J., 2021

SE-PPFM: A Searchable Encryption Scheme Supporting Privacy-Preserving Fuzzy Multikeyword in Cloud Systems.
IEEE Syst. J., 2021

Secure two-party integer comparison protocol without any third party.
Quantum Inf. Process., 2021

A cloud-aided privacy-preserving multi-dimensional data comparison protocol.
Inf. Sci., 2021

A Privacy-Preserving Optimization of Neighborhood-Based Recommendation for Medical-Aided Diagnosis and Treatment.
IEEE Internet Things J., 2021

Novel generic construction of leakage-resilient PKE scheme with CCA security.
Des. Codes Cryptogr., 2021

PP-OCQ: A distributed privacy-preserving optimal closeness query scheme for social networks.
Comput. Stand. Interfaces, 2021

Novel Public-Key Encryption with Continuous Leakage Amplification.
Comput. J., 2021

Efficient and Privacy-Preserving Massive Data Processing for Smart Grids.
IEEE Access, 2021

Privacy-Enhanced Mean-Variance Scheme Against Malicious Signature Attacks in Smart Grids.
Proceedings of the Ubiquitous Security - First International Conference, 2021

Key Exposure Resistant Group Key Agreement Protocol.
Proceedings of the Provable and Practical Security, 2021

A Compact Secret Image Sharing Scheme Based on Flexible Secret Matrix Sharing Scheme.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2021

A Federated Learning Assisted Conditional Privacy Preserving Scheme for Vehicle Networks.
Proceedings of the Cyberspace Safety and Security - 13th International Symposium, 2021

2020
PP-VCA: A Privacy-Preserving and Verifiable Combinatorial Auction Mechanism.
Wirel. Commun. Mob. Comput., 2020

Identity-based encryption with leakage-amplified chosen-ciphertext attacks security.
Theor. Comput. Sci., 2020

Efficient Obfuscation for Encrypted Identity-Based Signatures in Wireless Body Area Networks.
IEEE Syst. J., 2020

A Novel Privacy-Preserving Authentication Scheme for V2G Networks.
IEEE Syst. J., 2020

An efficient aggregation scheme resisting on malicious data mining attacks for smart grid.
Inf. Sci., 2020

PPO-CPQ: A Privacy-Preserving Optimization of Clinical Pathway Query for E-Healthcare Systems.
IEEE Internet Things J., 2020

A Lightweight Privacy-Preserving Fair Meeting Location Determination Scheme.
IEEE Internet Things J., 2020

A provable-secure and practical two-party distributed signing protocol for SM2 signature algorithm.
Frontiers Comput. Sci., 2020

Updatable Lossy Trapdoor Functions Under Consecutive Leakage.
Comput. J., 2020

Improvement of Attribute-Based Encryption Using Blakley Secret Sharing.
Proceedings of the Information Security and Privacy - 25th Australasian Conference, 2020

2019
PPO-DFK.
Dataset, October, 2019

Obfuscating EVES Algorithm and Its Application in Fair Electronic Transactions in Public Clouds.
IEEE Syst. J., 2019

Continuous After-the-Fact Leakage-Resilient Group Password-Authenticated Key Exchange.
Int. J. Netw. Secur., 2019

A Feasible Quantum Protocol for Private Set Intersection Cardinality.
IEEE Access, 2019

New Approach to Set Representation and Practical Private Set-Intersection Protocols.
IEEE Access, 2019

Development of an Early Warning System for Network Intrusion Detection Using Benford's Law Features.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2019

Provably Secure Proactive Secret Sharing Without the Adjacent Assumption.
Proceedings of the Provable Security, 2019

An Efficient Leakage-Resilient Authenticated Group Key Exchange Protocol.
Proceedings of the Network and System Security - 13th International Conference, 2019

A Fair and Efficient Secret Sharing Scheme Based on Cloud Assisting.
Proceedings of the Machine Learning for Cyber Security - Second International Conference, 2019

A Fair (t, n)-Threshold Secret Sharing Scheme with Efficient Cheater Identifying.
Proceedings of the Trust Management XIII - 13th IFIP WG 11.11 International Conference, 2019

Provably Secure Group Authentication in the Asynchronous Communication Model.
Proceedings of the Information and Communications Security - 21st International Conference, 2019

A Method of Collecting Four Character Medicine Effect Phrases in TCM Patents Based on Semi-supervised Learning.
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2019

An Efficient Image Encryption Scheme for Industrial Internet-of-Things Devices.
Proceedings of the 2nd International ACM Workshop on Security and Privacy for the Internet-of-Things, 2019

2018
On the Soundness and Security of Privacy-Preserving SVM for Outsourcing Data Classification.
IEEE Trans. Dependable Secur. Comput., 2018

After-the-Fact Leakage-Resilient Identity-Based Authenticated Key Exchange.
IEEE Syst. J., 2018

A Semi-Automatic Annotation Method of Effect Clue Words for Chinese Patents Based on Co-Training.
Int. J. Data Warehous. Min., 2018

Accountable mobile E-commerce scheme in intelligent cloud system transactions.
J. Ambient Intell. Humaniz. Comput., 2018

Secure and Fine-grained Electricity Consumption Aggregation Scheme for Smart Grid.
KSII Trans. Internet Inf. Syst., 2018

Certificate-based Smooth Projective Hashing and Its Applications.
Int. J. Netw. Secur., 2018

A publicly verifiable network coding scheme with null-space HMAC.
Int. J. Intell. Inf. Database Syst., 2018

ADR-lrABE: New Mechanism of Direct-revocable Attribute-Based Encryption with Continual-leakage Tolerances.
Fundam. Informaticae, 2018

An Ensemble Method based on Selection Using Bat Algorithm for Intrusion Detection.
Comput. J., 2018

Secure searchable public key encryption against insider keyword guessing attacks from indistinguishability obfuscation.
Sci. China Inf. Sci., 2018

Tolerating Sensitive-Leakage With Larger Plaintext-Space and Higher Leakage-Rate in Privacy-Aware Internet-of-Things.
IEEE Access, 2018

Consecutive Leakage-Resilient and Updatable Lossy Trapdoor Functions and Application in Sensitive Big-Data Environments.
IEEE Access, 2018

Secure and Membership-Based Data Sharing Scheme in V2G Networks.
IEEE Access, 2018

An Efficient and Provably Secure Private Polynomial Evaluation Scheme.
Proceedings of the Information Security Practice and Experience, 2018

Cloud-Based Data-Sharing Scheme Using Verifiable and CCA-Secure Re-encryption from Indistinguishability Obfuscation.
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018

Verifiable Secret Sharing Based on Hyperplane Geometry with Its Applications to Optimal Resilient Proactive Cryptosystems.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018

Secure Publicly Verifiable Computation with Polynomial Commitment in Cloud Computing.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018

2017
Efficient Privacy-Preserving Cube-Data Aggregation Scheme for Smart Grids.
IEEE Trans. Inf. Forensics Secur., 2017

Attribute-Based Hash Proof System Under Learning-With-Errors Assumption in Obfuscator-Free and Leakage-Resilient Environments.
IEEE Syst. J., 2017

Efficiently Obfuscating Anonymous Re-encryption Functionality with Average-Case Virtual Black-Box Security.
J. Inf. Sci. Eng., 2017

Privacy-preserving Outsourcing Schemes of Modular Exponentiations Using Single Untrusted Cloud Server.
KSII Trans. Internet Inf. Syst., 2017

Continuous Leakage Resilient Lossy Trapdoor Functions.
Inf., 2017

New efficient chosen ciphertext secure Elgamal encryption schemes for secure Cloud storage service.
Int. J. Web Grid Serv., 2017

Cost-effective secure E-health cloud system using identity based cryptographic techniques.
Future Gener. Comput. Syst., 2017

Obfuscating Re-encryption Algorithm With Flexible and Controllable Multi-Hop on Untrusted Outsourcing Server.
IEEE Access, 2017

Provably Leakage-Resilient Password-Based Authenticated Key Exchange in the Standard Model.
IEEE Access, 2017

Reliable Homomorphic Matrix Disguising Scheme.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2017

Leakage-Resilient Password-Based Authenticated Key Exchange.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2017

An Efficient Identity-Based Homomorphic Signature Scheme for Network Coding.
Proceedings of the Advances in Internetworking, 2017

2016
Continual key leakage tolerant encryption from extensible set delegation.
Secur. Commun. Networks, 2016

Strongly average-case secure obfuscation: achieving input privacy and circuit obscurity.
Secur. Commun. Networks, 2016

Realizing secret sharing with general access structure.
Inf. Sci., 2016

An efficient resource-fair commit-prove-fair-open protocol.
Int. J. Electron. Secur. Digit. Forensics, 2016

Privacy-friendly weighted-reputation aggregation protocols against malicious adversaries in cloud services.
Int. J. Commun. Syst., 2016

Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions.
IACR Cryptol. ePrint Arch., 2016

An error-tolerant keyword search scheme based on public-key encryption in secure cloud computing.
Concurr. Comput. Pract. Exp., 2016

Token-Leakage Tolerant and Vector Obfuscated IPE and Application in Privacy-Preserving Two-Party Point/Polynomial Evaluations.
Comput. J., 2016

Updatable Lossy Trapdoor Functions and Its Application in Continuous Leakage.
Proceedings of the Provable Security, 2016

One-Round Strong Oblivious Signature-Based Envelope.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
Efficient Public Key Encryption With Equality Test Supporting Flexible Authorization.
IEEE Trans. Inf. Forensics Secur., 2015

Security analysis of a homomorphic signature scheme for network coding.
Secur. Commun. Networks, 2015

基于Petri网的Web服务组合验证方法 (Verification Methods Based on Petri Networks for Web Services Composition).
计算机科学, 2015

基于服务组合模型结构特征的性能瓶颈定位方案 (Performance Bottlenecks Location Scheme Based on Structural Features of Service Composition Model).
计算机科学, 2015

Notes on Proxy Signcryption and Multi-proxy Signature Schemes.
Int. J. Netw. Secur., 2015

Functional Encryption Resilient to Hard-to-Invert Leakage.
Comput. J., 2015

Public Key Encryption with Delegated Equality Test in a Multi-User Setting.
Comput. J., 2015

Insecurity of an Efficient Identity-Based Proxy Signature in the Standard Model.
Comput. J., 2015

Program Obfuscator for Privacy-Carrying Unidirectional One-hop Re-encryption.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

2014
LR-FEAD: leakage-tolerating and attribute-hiding functional encryption mechanism with delegation in affine subspaces.
J. Supercomput., 2014

Unbounded anonymous hierarchical IBE with continual-key-leakage tolerance.
Secur. Commun. Networks, 2014

An efficient fair UC-secure protocol for two-party computation.
Secur. Commun. Networks, 2014

PPGJ: A privacy-preserving general join for outsourced encrypted database.
Secur. Commun. Networks, 2014

Anonymous spatial encryption under affine space delegation functionality with full security.
Inf. Sci., 2014

CCLAS: A Practical and Compact Certificateless Aggregate Signature with Share Extraction.
Int. J. Netw. Secur., 2014

Comments on FHH Anonymous Multireceiver Encryption.
Int. J. Netw. Secur., 2014

Fully secure constructions of spatial encryption with vector privacy.
Int. J. Commun. Syst., 2014

Anonymous encryption with partial-order subset delegation and its application in privacy email systems.
IET Inf. Secur., 2014

Key continual-leakage resilient broadcast cryptosystem from dual system in broadcast networks.
Frontiers Comput. Sci., 2014

ACP-lrFEM: Functional Encryption Mechanism with Automatic Control Policy in the Presence of Key Leakage.
Proceedings of the Information Security Practice and Experience, 2014

New Model and Construction of ABE: Achieving Key Resilient-Leakage and Attribute Direct-Revocation.
Proceedings of the Information Security and Privacy - 19th Australasian Conference, 2014

2013
Efficient Constructions of Anonymous Multireceiver Encryption Protocol and Their Deployment in Group E-mail Systems With Privacy Preservation.
IEEE Syst. J., 2013

Efficient and adaptively secure broadcast encryption systems.
Secur. Commun. Networks, 2013

Identity-based partially blind signature in the standard model for electronic cash.
Math. Comput. Model., 2013

Public Key Replacement and Universal Forgery of a SCLS Scheme.
Int. J. Netw. Secur., 2013

Leakage-resilient Attribute-based Encryptions with Fast Decryption: Model, Analysis and Construction.
IACR Cryptol. ePrint Arch., 2013

Bounded Leakage-Resilient Functional Encryption with Hidden Vector Predicate.
Comput. J., 2013

Leakage-Resilient Attribute-Based Encryption with Fast Decryption: Models, Analysis and Constructions.
Proceedings of the Information Security Practice and Experience, 2013

2012
Reconciling and improving of multi-receiver signcryption protocols with threshold decryption.
Secur. Commun. Networks, 2012

Privacy-Preserving OLAP for Accurate Answer.
J. Circuits Syst. Comput., 2012

An ID-based cryptographic mechanisms based on GDLP and IFP.
Inf. Process. Lett., 2012

Cryptanalysis of Strong Designated Verifier Signature Scheme with Non-delegatability and Non-transferability.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012

Analysis and Improvement of a Secret Broadcast with Binding Encryption in Broadcasting Networks.
IEICE Trans. Inf. Syst., 2012

Combining AHP with GIS in synthetic evaluation of environmental suitability for living in China's 35 major cities.
Int. J. Geogr. Inf. Sci., 2012

Efficient signcryption in the standard model.
Concurr. Comput. Pract. Exp., 2012

LR-UESDE: A Continual-Leakage Resilient Encryption with Unbounded Extensible Set Delegation.
Proceedings of the Provable Security - 6th International Conference, 2012

A Robust Fuzzy Extractor without ECCs.
Proceedings of the Information Security and Cryptology - 8th International Conference, 2012

2011
Group-oriented setting's multisigncryption scheme with threshold designcryption.
Inf. Sci., 2011

Multibiometric Based Secure Encryption, Authentication Scheme with Fuzzy Extractor.
Int. J. Netw. Secur., 2011

Cryptanalysis and Fixed of Short Signature Scheme without Random Oracle from Bilinear Parings.
Int. J. Netw. Secur., 2011

Anonymous Encryption with Partial-Order Subset Delegation Functionality.
Proceedings of the Provable Security - 5th International Conference, 2011

Efficient Identity-Based Signcryption in the Standard Model.
Proceedings of the Provable Security - 5th International Conference, 2011

Dual-Verifiers DVS with Message Recovery for Tolerant Routing in Wireless Sensor Networks.
Proceedings of the Intelligence and Security Informatics - Pacific Asia Workshop, 2011

GeoEnc: Geometric Area Based Keys and Policies in Functional Encryption Systems.
Proceedings of the Information Security and Privacy - 16th Australasian Conference, 2011

2010
A Classified Credential Selection Scheme with Disclosure-minimizing Privacy.
J. Digit. Content Technol. its Appl., 2010

Fuzzy Biometric Signcryption Scheme with Bilinear Pairings in the Standard Model.
Proceedings of the Intelligence and Security Informatics, Pacific Asia Workshop, 2010

Towards Confidentiality of ID-Based Signcryption Schemes under without Random Oracle Model.
Proceedings of the Intelligence and Security Informatics, Pacific Asia Workshop, 2010

2009
Ordered Semiring-based Trust Establish Model with Risk Evaluating.
Int. J. Netw. Secur., 2009

Analysis and Enhance of Anonymous Signcryption Scheme.
IACR Cryptol. ePrint Arch., 2009

Analysis and Improvement of an ID-Based Anonymous Signcryption Model.
Proceedings of the Emerging Intelligent Computing Technology and Applications, 2009

2008
Interactive analysis of systems biology molecular expression data.
BMC Syst. Biol., 2008

Efficient Secret Authenticatable Anonymous Signcryption Scheme with Identity Privacy.
Proceedings of the Intelligence and Security Informatics, 2008

Assertions Signcryption Scheme in Decentralized Autonomous Trust Environments.
Proceedings of the Autonomic and Trusted Computing, 5th International Conference, 2008

2007
Tracing Lineage Beyond Relational Operators.
Proceedings of the 33rd International Conference on Very Large Data Bases, 2007

Using Trust Metric to Detect Malicious Behaviors in WSNs.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

Trust-based Distributed Authentication Middleware in Ubiquitous Mobile Environments.
Proceedings of the Third International Conference on Natural Computation, 2007

Identifying Rare Classes with Sparse Training Data.
Proceedings of the Database and Expert Systems Applications, 18th International Conference, 2007

Tracing Lineage in Multi-version Scientific Databases.
Proceedings of the 7th IEEE International Conference on Bioinformatics and Bioengineering, 2007

Efficient Identity-Based Signcryption Scheme for Multiple Receivers.
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007


  Loading...