Peng Zhang

According to our database1, Peng Zhang
  • authored at least 18 papers between 2014 and 2018.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2018
An efficient access control scheme with outsourcing capability and attribute update for fog computing.
Future Generation Comp. Syst., 2018

2017
A Parallel Hash Function with Variable Initial Values.
Wireless Personal Communications, 2017

Research on the Hash Function Structures and its Application.
Wireless Personal Communications, 2017

Efficient Chosen-Ciphertext Secure Encryption from R-LWE.
Wireless Personal Communications, 2017

Utilizing fully homomorphic encryption to implement secure medical computation in smart cities.
Personal and Ubiquitous Computing, 2017

Anonymous Anti-Sybil Attack Protocol for Mobile Healthcare Networks Analytics.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Outsourcing Privacy Preserving ID3 Decision Tree Algorithm over Encrypted Data-sets for Two-Parties.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

A New Blockchain-Based Value-Added Tax System.
Proceedings of the Provable Security, 2017

An Improved Leveled Fully Homomorphic Encryption Scheme over the Integers.
Proceedings of the Information Security Practice and Experience, 2017

Dynamic Data Operations with Deduplication in Privacy-Preserving Public Auditing for Secure Cloud Storage.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017

Attribute-Based Encryption Scheme Supporting Decryption Outsourcing and Attribute Revocation in Cloud Storage.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017

2016
Efficient identity-based leveled fully homomorphic encryption from RLWE.
Security and Communication Networks, 2016

Efficient Signature Schemes from R-LWE.
TIIS, 2016

Towards Certificate-Based Group Encryption.
Proceedings of the Provable Security, 2016

An accelerated fully homomorphic encryption scheme over the integers.
Proceedings of the 4th International Conference on Cloud Computing and Intelligence Systems, 2016

A Cloud-Based Access Control Scheme with User Revocation and Attribute Update.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
A Fingerprint Encryption Scheme Based on Irreversible Function and Secure Authentication.
Comp. Math. Methods in Medicine, 2015

2014
Efficient Linear Homomorphic Encryption from LWE Over Rings.
Wireless Personal Communications, 2014


  Loading...