Peng Zeng

Orcid: 0000-0002-3904-9245

Affiliations:
  • East China Normal University, Shanghai Key Laboratory of Trustworthy Computing, China
  • Shanghai Jiao Tong University, China (PhD 2009)


According to our database1, Peng Zeng authored at least 34 papers between 2009 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Security Analysis of a User Authentication Scheme for IoT-Based Healthcare.
IEEE Internet Things J., April, 2023

Provable Multiple-Copy Integrity Auditing Scheme for Cloud-Based IoT.
IEEE Syst. J., March, 2023

A Certificateless Provable Data Possession Scheme for Cloud-Based EHRs.
IEEE Trans. Inf. Forensics Secur., 2023

EFPB: Efficient Fair Payment Based on Blockchain for Outsourcing Services in Cloud Computing.
IEEE Access, 2023

A New Digital Signature Primitive and Its Application in Blockchain.
IEEE Access, 2023

2022
Multicopy and Multiserver Provable Data Possession for Cloud-Based IoT.
IEEE Internet Things J., 2022

A New Code-Based Blind Signature Scheme.
Comput. J., 2022

2021
Efficient Policy-Hiding and Large Universe Attribute-Based Encryption With Public Traceability for Internet of Medical Things.
IEEE Internet Things J., 2021

An Efficient Access Control Scheme With Outsourcing and Attribute Revocation for Fog-Enabled E-Health.
IEEE Access, 2021

Efficient All-or-Nothing Public Key Encryption With Authenticated Equality Test.
IEEE Access, 2021

2020
MMDA: Multidimensional and multidirectional data aggregation for edge computing-enhanced IoT.
J. Syst. Archit., 2020

An Efficient Privacy-Preserving Protocol for Computing kth Minimum Value in P2P Networks.
J. Circuits Syst. Comput., 2020

Large-Universe Attribute-Based Encryption With Public Traceability for Cloud Storage.
IEEE Internet Things J., 2020

2019
Constructions of Linear Codes With One-Dimensional Hull.
IEEE Trans. Inf. Theory, 2019

An IND-CCA2 secure post-quantum encryption scheme and a secure cloud storage use case.
Hum. centric Comput. Inf. Sci., 2019

2018
FGDA: Fine-grained data analysis in privacy-preserving smart grid communications.
Peer-to-Peer Netw. Appl., 2018

Efficient Ring Signature and Group Signature Schemes Based on q-ary Identification Protocols.
Comput. J., 2018

A New Kind of Conditional Proxy Re-Encryption for Secure Cloud Storage.
IEEE Access, 2018

A Secure and Practical RFID Ownership Transfer Protocol Based on Chebyshev Polynomials.
IEEE Access, 2018

A Lightweight Path Authentication Protocol for RFID-Based Supply Chains.
Proceedings of the 17th IEEE International Conference On Trust, 2018

2017
Erratum to "An Efficient Code-Based Threshold Ring Signature Scheme with a Leader-Participant Model".
Secur. Commun. Networks, 2017

An Efficient Code-Based Threshold Ring Signature Scheme with a Leader-Participant Model.
Secur. Commun. Networks, 2017

An Efficient Data Aggregation Scheme in Privacy-Preserving Smart Grid Communications with a High Practicability.
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2017

2016
An Improved Online/Offline Identity-Based Signature Scheme for WSNs.
Int. J. Netw. Secur., 2016

A Provably Secure Blind Signature Based on Coding Theory.
Proceedings of the 22nd IEEE International Conference on Parallel and Distributed Systems, 2016

An Efficient Ring Signature Scheme Based on Syndrome Decoding Problem.
Proceedings of the 12th International Conference on Computational Intelligence and Security, 2016

2015
A CCA2-Secure Multi-Decrypter Encryption Scheme Without Random Oracles.
Informatica, 2015

Optimal codes as Tanner codes with cyclic component codes.
Des. Codes Cryptogr., 2015

2014
MDMR-IBE: efficient multiple domain multi-receiver identity-based encryption.
Secur. Commun. Networks, 2014

Multi-sender Broadcast Authentication in Wireless Sensor Networks.
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014

2011
An ID-based digital watermarking protocol for copyright protection.
Comput. Electr. Eng., 2011

2010
On the security of an enhanced novel access control protocol for wireless sensor networks.
IEEE Trans. Consumer Electron., 2010

2009
Security weakness in a dynamic program update protocol for wireless sensor networks.
IEEE Commun. Lett., 2009

On the anonymity of some authentication schemes for wireless communications.
IEEE Commun. Lett., 2009


  Loading...