Wen Tao Zhu

According to our database1, Wen Tao Zhu authored at least 51 papers between 2004 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2018
Making a good thing better: enhancing password/PIN-based user authentication with smartwatch.
Cybersecurity, 2018

User-friendly deniable storage for mobile devices.
Computers & Security, 2018

MobiCeal: Towards Secure and Practical Plausibly Deniable Encryption on Mobile Devices.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2018

Harnessing the Cloud for Secure and Efficient Outsourcing of Non-negative Matrix Factorization.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

2017
An Efficient Elliptic Curve Cryptography Signature Server With GPU Acceleration.
IEEE Trans. Information Forensics and Security, 2017

EvoPass: Evolvable graphical password against shoulder-surfing attacks.
Computers & Security, 2017

Employing Smartwatch for Enhanced Password Authentication.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017

2016
Generating Correlated Digital Certificates: Framework and Applications.
IEEE Trans. Information Forensics and Security, 2016

PRAC: Efficient privacy protection for vehicle-to-grid communications in the smart grid.
Computers & Security, 2016

A Secure and Fast Dispersal Storage Scheme Based on the Learning with Errors Problem.
Proceedings of the Security and Privacy in Communication Networks, 2016

DynaEgo: Privacy-Preserving Collaborative Filtering Recommender System Based on Social-Aware Differential Privacy.
Proceedings of the Information and Communications Security - 18th International Conference, 2016

Privacy Breach by Exploiting postMessage in HTML5: Identification, Evaluation, and Countermeasure.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Towards Privacy-Preserving Data Mining in Online Social Networks: Distance-Grained and Item-Grained Differential Privacy.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

Security Analysis on Privacy-Preserving Cloud Aided Biometric Identification Schemes.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
RIKE+ : using revocable identities to support key escrow in public key infrastructures with flexibility.
IET Information Security, 2015

WAVE: Secure Wireless Pairing Exploiting Human Body Movements.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

2014
Publishing and sharing encrypted data with potential friends in online social networks.
Security and Communication Networks, 2014

MobiHydra: Pragmatic and Multi-level Plausibly Deniable Encryption Storage for Mobile Devices.
Proceedings of the Information Security - 17th International Conference, 2014

Remotely wiping sensitive data on stolen smartphones.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

2013
Security Concerns in Popular Cloud Storage Services.
IEEE Pervasive Computing, 2013

Towards secure and communication-efficient broadcast encryption systems.
J. Network and Computer Applications, 2013

A Generic Framework for Anonymous Authentication in Mobile Networks.
J. Comput. Sci. Technol., 2013

Preserving User Privacy in the Smart Grid by Hiding Appliance Load Characteristics.
Proceedings of the Cyberspace Safety and Security - 5th International Symposium, 2013

2012
A Comment on "MABS: Multicast Authentication Based on Batch Signature".
IEEE Trans. Mob. Comput., 2012

Detecting node replication attacks in mobile sensor networks: theory and approaches.
Security and Communication Networks, 2012

Detecting node replication attacks in wireless sensor networks: A survey.
J. Network and Computer Applications, 2012

Masque: Access Control for Interactive Sharing of Encrypted Data in Social Networks.
Proceedings of the Network and System Security - 6th International Conference, 2012

F5P5: Keyword Search over Encrypted Data with Five Functions and Five Privacy Assurances.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

2011
Secure localization with attack detection in wireless sensor networks.
Int. J. Inf. Sec., 2011

A secure and efficient data aggregation scheme for wireless sensor networks.
Concurrency and Computation: Practice and Experience, 2011

A generic framework for constructing cross-realm C2C-PAKA protocols based on the smart card.
Concurrency and Computation: Practice and Experience, 2011

An efficient mutual authentication and key agreement protocol preserving user anonymity in mobile networks.
Computer Communications, 2011

A Smart Card based Generic Construction for Anonymous Authentication in Mobile Networks.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011

Applying Time-Bound Hierarchical Key Assignment in Wireless Sensor Networks.
Proceedings of the Information and Communications Security - 13th International Conference, 2011

Secure mobile subscription of sensor-encrypted data.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

2010
New Constructions for Identity-Based Unidirectional Proxy Re-Encryption.
J. Comput. Sci. Technol., 2010

Time-Bound Hierarchical Key Assignment: An Overview.
IEICE Transactions, 2010

Protecting Source Location Privacy in Wireless Sensor Networks with Data Aggregation.
Proceedings of the Ubiquitous Intelligence and Computing - 7th International Conference, 2010

2009
Collision Attacks With Budget Constraints on Key Management Schemes for Secure Multimedia Multicast.
IEEE Trans. Multimedia, 2009

Propagation of active worms: A survey.
Comput. Syst. Sci. Eng., 2009

An improved smart card based password authentication scheme with provable security.
Computer Standards & Interfaces, 2009

Argus: A Light-Weighted Secure Localization Scheme for Sensor Networks.
Proceedings of the Autonomic and Trusted Computing, 6th International Conference, 2009

2008
A Cost-Efficient Secure Multimedia Proxy System.
IEEE Trans. Multimedia, 2008

Security of the redefined Liaw's broadcasting cryptosystem.
Computers & Mathematics with Applications, 2008

Analyzing Euler-Fermat Theorem Based Multicast Key Distribution Schemes with Chinese Remainder Theorem.
Proceedings of the IFIP International Conference on Network and Parallel Computing, 2008

A Dual-Head Cluster Based Secure Aggregation Scheme for Sensor Networks.
Proceedings of the IFIP International Conference on Network and Parallel Computing, 2008

General Weakness in Certain Broadcast Encryption Protocols Employing the Remainder Approach.
Proceedings of IEEE International Conference on Communications, 2008

2007
Remarks on a Hypersphere Oriented Multiparty Key Agreement Protocol.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007

2005
Optimizing the tree structure in secure multicast key management.
IEEE Communications Letters, 2005

Cryptanalysis of Two Group Key Management Protocols for Secure Multicast.
Proceedings of the Cryptology and Network Security, 4th International Conference, 2005

2004
Rethinking of Iolus: Constructing the Secure Multicast Infrastructure.
Proceedings of the Information Networking, 2004


  Loading...