Shuang-Gen Liu
This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.
Bibliography
2025
IEEE Internet Things J., July, 2025
An Efficient Certificateless Key-Insulated Anonymous Signature Scheme Based on Smart Contract for Data Sharing in Industrial Internet of Things.
IEEE Internet Things J., March, 2025
PQES: Post-quantum encryption and signature scheme based on FFT-accelerated polynomial ring lattice for IoT devices.
J. Syst. Archit., 2025
J. Syst. Archit., 2025
J. Inf. Secur. Appl., 2025
An Enhanced End-to-End Secure Communication Solution for IoT Smart Medical Devices Based on MQTT Protocol.
IEEE Internet Things J., 2025
PQ-BCDA: A post-quantum blockchain based cross-domain authentication scheme for Internet of Things.
Internet Things, 2025
Recovery degree constrained equiconcept/pseudo-equiconcept reduction in symmetric formal contexts.
Int. J. Approx. Reason., 2025
A blockchain and IPFS-Aided anonymous traitor tracing scheme based on puncturable encryption in Industrial Internet of Things.
Comput. Electr. Eng., 2025
2024
A Certificateless Threshold Proxy Re-Encrypted Data-Sharing Scheme With Cloud-Chain Collaboration in Industrial Internet Environments.
IEEE Internet Things J., October, 2024
Secure Data Sharing in V2N Based on a Privacy-Preserving Identify-Based Broadcast Proxy Re-Encryption Plus Scheme.
IEEE Netw., May, 2024
Efficient Certificateless Blind Signature Scheme With Conditional Revocation for Mobile Crowdsensing Within Smart City.
IEEE Internet Things J., May, 2024
A traceable and revocable broadcast encryption scheme for preventing malicious encryptors in Medical IoT.
J. Syst. Archit., 2024
Puncturable-based broadcast encryption with tracking for preventing malicious encryptors in cloud file sharing.
J. Inf. Secur. Appl., 2024
Inf. Sci., 2024
A secure certificateless ring signcryption scheme based on SM2 algorithm in smart grid.
Comput. Commun., 2024
2023
Internet Things, October, 2023
J. Syst. Archit., 2023
Proceedings of the Artificial Intelligence Security and Privacy, 2023
2022
A power resource dispatching framework with a privacy protection function in the Power Internet of Things.
Frontiers Inf. Technol. Electron. Eng., 2022
Secure and efficient two-party collaborative SM9 signature scheme suitable for smart home.
J. King Saud Univ. Comput. Inf. Sci., 2022
2021
Efficient Septuple Formula for Elliptic Curve and Efficient Scalar Multiplication Using a Triple-Base Chain Representation.
IEEE Access, 2021
An Efficient Double Parameter Elliptic Curve Digital Signature Algorithm for Blockchain.
IEEE Access, 2021
2020
Fast Scalar Multiplication Algorithm Based on Co_Z Operations on Elliptic Curves over GF(3^m).
Int. J. Netw. Secur., 2020
2019
Int. J. Netw. Secur., 2019
Int. J. Netw. Secur., 2019
Int. J. Netw. Secur., 2019
2018
Int. J. Netw. Secur., 2018
Int. J. Embed. Syst., 2018
Int. J. Comput. Sci. Eng., 2018
2015
SPA Resistant Scalar Multiplication Based on Addition and Tripling Indistinguishable on Elliptic Curve Cryptosystem.
Proceedings of the 10th International Conference on P2P, 2015
Fast and Secure Elliptic Curve Scalar Multiplication Algorithm Based on a Kind of Deformed Fibonacci-Type Series.
Proceedings of the 10th International Conference on P2P, 2015
2009
Comput. Stand. Interfaces, 2009
2006
IACR Cryptol. ePrint Arch., 2006
ID-Based ( <i>t</i> , <i>n</i> ) Threshold Proxy Signcryption for Multi-agent Systems.
Proceedings of the Computational Intelligence and Security, International Conference, 2006