Xiaoyan Zhu

According to our database1, Xiaoyan Zhu authored at least 27 papers between 2009 and 2019.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Publicly Verifiable Boolean Query Over Outsourced Encrypted Data.
IEEE Trans. Cloud Comput., 2019

2016
Cooperative downloading with privacy preservation and access control for value-added services in VANETs.
Int. J. Grid Util. Comput., 2016

2015
Efficient private matching based on blind signature for proximity-based mobile social networks.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

2013
Privacy-Preserving Cooperative Downloading for Value-Added Services in VANETs.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Privacy-preserving attribute-based friend search in geosocial networks with untrusted servers.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

2012
Using homomorphic encryption to secure the combinatorial spectrum auction without the trustworthy auctioneer.
Wirel. Networks, 2012

CPTT: A high-throughput coding-aware routing metric for multi-hop wireless networks.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

2011
RescueMe: Location-Based Secure and Dependable VANETs for Disaster Rescue.
IEEE J. Sel. Areas Commun., 2011

Efficient trust based information sharing schemes over distributed collaborative networks.
Proceedings of the MILCOM 2011, 2011

C4: A new paradigm for providing incentives in multi-hop wireless networks.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

HCPP: Cryptography Based Secure EHR System for Patient Privacy and Emergency Healthcare.
Proceedings of the 2011 International Conference on Distributed Computing Systems, 2011

A Multi-Hop Privacy-Preserving Reputation Scheme in Online Social Networks.
Proceedings of the Global Communications Conference, 2011

2010
How to secure multi-domain wireless mesh networks.
Wirel. Networks, 2010

Privacy and emergency response in e-healthcare leveraging wireless body sensor networks.
IEEE Wirel. Commun., 2010

Threshold optimization for rate adaptation algorithms in IEEE 802.11 WLANs.
IEEE Trans. Wirel. Commun., 2010

MABS: Multicast Authentication Based on Batch Signature.
IEEE Trans. Mob. Comput., 2010

Privacy and security for online social networks: challenges and opportunities.
IEEE Netw., 2010

A Formal Study of Trust-Based Routing in Wireless Ad Hoc Networks.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

A Privacy-Preserving Scheme for Online Social Networks with Efficient Revocation.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Preserving Privacy in Emergency Response Based on Wireless Body Sensor Networks.
Proceedings of the Global Communications Conference, 2010

2009
A batched network coding scheme for wireless networks.
Wirel. Networks, 2009

Securing resource-constrained wireless ad hoc networks.
IEEE Wirel. Commun., 2009

Throughput and Delay in Cooperative Wireless Networks With Partial Infrastructure.
IEEE Trans. Veh. Technol., 2009

On the improvement of scaling laws for large-scale MANETs with network coding.
IEEE J. Sel. Areas Commun., 2009

Throughput-Delay Tradeoffs in Large-Scale MANETs with Network Coding.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

Rethinking Thresholds-Based Rate Adaptation Algorithms: A Reverse Engineering Perspective.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

C and M: A New Network Coding Scheme for Wireless Networks.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009


  Loading...