Song Luo

Orcid: 0000-0003-1498-5253

According to our database1, Song Luo authored at least 44 papers between 2004 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A Smart-Contract-Based Policy-Domain Access Control Framework for Distributed Industrial IoT.
IEEE Internet Things J., April, 2024

Secure Sharing of Electronic Medical Records Based on Blockchain.
Int. J. Distributed Sens. Networks, January, 2024

2023
Research on risk management of commercial Banks under financial innovation based on fixed effects model.
Proceedings of the 2023 8th International Conference on Intelligent Information Processing, 2023

A Trusted Sharing Model for Risk Information of Food Full-process and All-information Based on Blockchain and Federated Learning.
Proceedings of the IEEE International Conference on Blockchain, 2023

2022
Experimental Investigation on the Influence of Depth on Rockburst Characteristics in Circular Tunnels.
Sensors, 2022

Intrusion Detection System Using PSO and DE Algorithms with BP Neural Network.
Proceedings of the Fuzzy Systems and Data Mining VIII, 2022

Attack and Improvement of a Hidden Vector Encryption Scheme.
Proceedings of CECNet 2022, 2022

2021
Real-Time Detection of Dictionary DGA Network Traffic Using Deep Learning.
SN Comput. Sci., 2021

Micro-Expression Recognition Based on Pixel Residual Sum and Cropped Gaussian Pyramid.
Frontiers Neurorobotics, 2021

A New Identity-Based Encryption Scheme with Accountable Authority Based on SM9.
Proceedings of CECNet 2021, 2021

The Present Situation and Development Direction of Wisdom Museum from the Perspective of New Technology.
Proceedings of the AIAM 2021: 3rd International Conference on Artificial Intelligence and Advanced Manufacture, Manchester, United Kingdom, October 23, 2021

2020
Normal Information Diffusion Distribution and Its Application in Inferring the Optimal Probability Density Functions of the Event Coordinates From the Microseismic or Acoustic Emission Sources.
IEEE Access, 2020

2019
Non-adaptive group testing on graphs with connectivity.
J. Comb. Optim., 2019

An Improved Unbounded HIBE Scheme in the Prime Order Setting.
Proceedings of the Fuzzy Systems and Data Mining V, 2019

2018
A method for discovering the knowledge of item rank from consumer reviews.
JSIAM Lett., 2018

A new strong security model for stateful authenticated group key exchange.
Int. J. Inf. Sec., 2018

Two-message Key Exchange with Strong Security from Ideal Lattices.
IACR Cryptol. ePrint Arch., 2018

2017
Randomized authentication primitive problem in key exchange with strong security.
J. Inf. Secur. Appl., 2017

SignORKE: improving pairing-based one-round key exchange without random oracles.
IET Inf. Secur., 2017

Wave equivalent plane estimation for wave reconstruction in imaging through water waves.
Proceedings of the 2017 IEEE International Conference on Real-time Computing and Robotics, 2017

New Proof for BKP IBE Scheme and Improvement in the MIMC Setting.
Proceedings of the Information Security Practice and Experience, 2017

2016
A Lightweight Generic Compiler for Authenticated Key Exchange from Non-interactive Key Exchange with Auxiliary Input.
Int. J. Netw. Secur., 2016

Orchestration of software-defined security services.
Proceedings of the IEEE International Conference on Communication, 2016

2015
Anonymous hierarchical identity-based encryption without key delegation in decryption.
Int. J. Embed. Syst., 2015

On the Number of Edges in a Minimum C<sub>6</sub>-Saturated Graph.
Graphs Comb., 2015

2014
Hierarchical identity-based encryption without key delegation in decryption.
Int. J. Grid Util. Comput., 2014

Ranking Smartphone Apps Based on Users' Behavior Records.
Proceedings of the Serviceology for Designing the Future, 2014

2013
On the Anonymity of Identity-Based Encryption.
J. Appl. Math., 2013

From Spectrum Agility to Network Agility: Proactive and Adaptive Reconfiguration for Reliable Communication in Tactical Networks.
Proceedings of the 32th IEEE Military Communications Conference, 2013

2012
Scented Node Protocol for MANET Routing.
Proceedings of the Biologically Inspired Networking and Sensing, 2012

2011
New Fully Secure Hierarchical Identity-Based Encryption with Constant Size Ciphertexts.
Proceedings of the Information Security Practice and Experience, 2011

Fully Secure Unidirectional Identity-Based Proxy Re-encryption.
Proceedings of the Information Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea, November 30, 2011

A Variant of Boyen-Waters Anonymous IBE Scheme.
Proceedings of the Information and Communications Security - 13th International Conference, 2011

Lightweight RFID Mutual Authentication Protocol against Feasible Problems.
Proceedings of the Information and Communications Security - 13th International Conference, 2011

A Novel Commutative Blinding Identity Based Encryption Scheme.
Proceedings of the Foundations and Practice of Security, 2011

A New Leakage-Resilient IBE Scheme in the Relative Leakage Model.
Proceedings of the Data and Applications Security and Privacy XXV, 2011

2010
New Construction of Identity-based Proxy Re-encryption.
IACR Cryptol. ePrint Arch., 2010

Implementing Attribute-Based Encryption in Web Services.
Proceedings of the IEEE International Conference on Web Services, 2010

Ciphertext Policy Attribute-Based Proxy Re-encryption.
Proceedings of the Information and Communications Security - 12th International Conference, 2010

2008
Exploiting Heavy-Tailed Statistics for Predictable QoS Routing in Ad Hoc Wireless Networks.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

Heavy-Tailed Workload Aware Ad Hoc Routing.
Proceedings of IEEE International Conference on Communications, 2008

2005
Realistic internet traffic simulation through mixture modeling and a case study.
Proceedings of the 37th Winter Simulation Conference, Orlando, FL, USA, December 4-7, 2005, 2005

Simulating application level self-similar network traffic using hybrid heavy-tailed distributions.
Proceedings of the 43nd Annual Southeast Regional Conference, 2005

2004
Modeling Networking Protocols to Test Intrusion Detection Systems.
Proceedings of the 29th Annual IEEE Conference on Local Computer Networks (LCN 2004), 2004


  Loading...