Zhen Yu Wu

According to our database1, Zhen Yu Wu authored at least 18 papers between 2006 and 2018.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2018
A hierarchical access control scheme based on Lagrange interpolation for mobile agents.
Int. J. Distributed Sens. Networks, 2018

2014
An electronic voting mechanism for fighting bribery and coercion.
J. Netw. Comput. Appl., 2014

2013
A Reliable RFID Mutual Authentication Scheme for Healthcare Environments.
J. Medical Syst., 2013

A Secure RFID Authentication Scheme for Medicine Applications.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013

Detect Rare Events via MICE Algorithm with Optimal Threshold.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013

2012
A Reliable User Authentication and Key Agreement Scheme for Web-Based Hospital-Acquired Infection Surveillance Information System.
J. Medical Syst., 2012

A Secure Authentication Scheme for Telecare Medicine Information Systems.
J. Medical Syst., 2012

Redactable Signatures for Signed CDA Documents.
J. Medical Syst., 2012

A Password-Based User Authentication Scheme for the Integrated EPR Information System.
J. Medical Syst., 2012

A Secure Integrated Medical Information System.
J. Medical Syst., 2012

Casting Ballots over Internet Connection Against Bribery and Coercion.
Comput. J., 2012

A Reliable Dynamic User-Remote Password Authentication Scheme over Insecure Network.
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012

2009
Approach to designing bribery-free and coercion-free electronic voting scheme.
J. Syst. Softw., 2009

Ring signature scheme for ECC-based anonymous signcryption.
Comput. Stand. Interfaces, 2009

2008
Unconditionally secure cryptosystems based on quantum cryptography.
Inf. Sci., 2008

2006
Unconditionally Secure Cryptosystem Based on Quantum Cryptography.
Proceedings of the 2006 Joint Conference on Information Sciences, 2006

Anonymous Signcryption in Ring Signature Scheme over Elliptic Curve Cryptosystem.
Proceedings of the 2006 Joint Conference on Information Sciences, 2006

A Novel ID-Based Threshold Ring Signature Scheme Competent for Anonymity and Anti-forgery.
Proceedings of the Computational Intelligence and Security, International Conference, 2006


  Loading...