Zhengping Jin

Orcid: 0000-0002-1468-4701

According to our database1, Zhengping Jin authored at least 66 papers between 1986 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Multi-player evolutionary game of federated learning incentive mechanism based on system dynamics.
Neurocomputing, November, 2023

Publishing locally private high-dimensional synthetic data efficiently.
Inf. Sci., July, 2023

2022
Dynamic Proof of Data Possession and Replication With Tree Sharing and Batch Verification in the Cloud.
IEEE Trans. Serv. Comput., 2022

Public Key Encryption With Equality Test Supporting Flexible Designated Authorization in Cloud Storage.
IEEE Syst. J., 2022

Sound Can Help Us See More Clearly.
Sensors, 2022

A rORAM scheme with logarithmic bandwidth and logarithmic locality.
Int. J. Intell. Syst., 2022

2020
A Flexible KP-ABE Suit for Mobile User Realizing Decryption Outsourcing and Attribute Revocation.
Wirel. Pers. Commun., 2020

Comments on "Provable Multicopy Dynamic Data Possession in Cloud Computing Systems".
IEEE Trans. Inf. Forensics Secur., 2020

KNN search-based trajectory cloaking against the Cell-ID tracking in cellular network.
Soft Comput., 2020

A Multi-User Public Key Encryption with Multi-Keyword Search out of Bilinear Pairings.
Sensors, 2020

Adaptively secure broadcast encryption with authenticated content distributors.
Multim. Tools Appl., 2020

New Blind Filter Protocol: An Improved Privacy-Preserving Scheme for Location-Based Services.
Comput. J., 2020

Improved Proofs Of Retrievability And Replication For Data Availability In Cloud Storage.
Comput. J., 2020

A Multi-Step Attack Detection Model Based on Alerts of Smart Grid Monitoring System.
IEEE Access, 2020

2019
Decentralized, Revocable and Verifiable Attribute-Based Encryption in Hybrid Cloud System.
Wirel. Pers. Commun., 2019

Quantum-Resistant Identity-Based Signature with Message Recovery and Proxy Delegation.
Symmetry, 2019

Authenticated public key broadcast encryption with short ciphertexts.
Multim. Tools Appl., 2019

An efficient outsourced attribute-based encryption scheme in the device-to-device mobile network.
Int. J. Distributed Sens. Networks, 2019

Outsourced dynamic provable data possession with batch update for secure cloud storage.
Future Gener. Comput. Syst., 2019

An Efficient ABE Scheme With Verifiable Outsourced Encryption and Decryption.
IEEE Access, 2019

2018
Secure and Efficiently Searchable IoT Communication Data Management Model: Using Blockchain as a new tool.
CoRR, 2018

An Anti-Quantum Transaction Authentication Approach in Blockchain.
IEEE Access, 2018

A Lattice-Based Unordered Aggregate Signature Scheme Based on the Intersection Method.
IEEE Access, 2018

Generic Construction of Outsourced Attribute-Based Encryption Without Key Escrow.
IEEE Access, 2018

A New Insight - Proxy Re-encryption Under LWE with Strong Anti-collusion.
Proceedings of the Information Security Practice and Experience, 2018

An Android Malware Detection Method Based on Deep AutoEncoder.
Proceedings of the 2018 Artificial Intelligence and Cloud Computing Conference, 2018

2017
Security on a Knapsack-Type Encryption Scheme Based Upon Hybrid-Model Assumption.
Int. J. Netw. Secur., 2017

2016
Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud Computing.
IEEE Trans. Parallel Distributed Syst., 2016

Adaptively Secure Broadcast Encryption With Constant Ciphertexts.
IEEE Trans. Broadcast., 2016

A formal construction of certificateless proxy multi-signature scheme.
Int. J. Secur. Networks, 2016

Energy-Aware Location Privacy Routing for Wireless Sensor Networks.
Proceedings of the Security, Privacy and Anonymity in Computation, Communication and Storage, 2016

ChainMR Crawler: A Distributed Vertical Crawler Based on MapReduce.
Proceedings of the Security, Privacy and Anonymity in Computation, Communication and Storage, 2016

2015
Analysis and Improvement of 'Chaotic Map Based Mobile Dynamic ID Authenticated Key Agreement Scheme'.
Wirel. Pers. Commun., 2015

A strongly secure identity-based authenticated key agreement protocol without pairings under the GDH assumption.
Secur. Commun. Networks, 2015

A Novel Authentication Scheme Using Self-certified Public Keys for Telecare Medical Information Systems.
J. Medical Syst., 2015

An Improved Biometrics-Based Authentication Scheme for Telecare Medical Information Systems.
J. Medical Syst., 2015

Cryptanalysis and improvement of a certificateless aggregate signature scheme.
Inf. Sci., 2015

An anonymous and efficient remote biometrics user authentication scheme in a multi server environment.
Frontiers Comput. Sci., 2015

2014
A Secure and Efficient Authentication and Key Agreement Scheme Based on ECC for Telecare Medicine Information Systems.
J. Medical Syst., 2014

Secure Privacy-Preserving Biometric Authentication Scheme for Telecare Medicine Information Systems.
J. Medical Syst., 2014

A lattice-based signcryption scheme without random oracles.
Frontiers Comput. Sci., 2014

Cryptanalysis and improvement of a certificateless encryption scheme in the standard model.
Frontiers Comput. Sci., 2014

2013
An Efficient and Provably-Secure Certificateless Public Key Encryption Scheme for Telecare Medicine Information Systems.
J. Medical Syst., 2013

A Strongly Secure Pairing-free Certificateless Authenticated Key Agreement Protocol for Low-Power Devices.
Inf. Technol. Control., 2013

An improved authentication with key agreement scheme on elliptic curve cryptosystem for global mobility networks.
Int. J. Netw. Manag., 2013

On the security of a certificateless aggregate signature scheme.
IACR Cryptol. ePrint Arch., 2013

On the security of a certi cateless signature scheme in the standard model.
IACR Cryptol. ePrint Arch., 2013

A novel pairing-free certificateless authenticated key agreement protocol with provable security.
Frontiers Comput. Sci., 2013

Cryptanalysis and improvement of two certificateless three-party authenticated key agreement protocols
CoRR, 2013

A novel privacy preserving keyword searching for cloud storage.
Proceedings of the Eleventh Annual International Conference on Privacy, Security and Trust, 2013

Checkpoint-restart for a network of virtual machines.
Proceedings of the 2013 IEEE International Conference on Cluster Computing, 2013

2012
A Light-Weight Rainbow Signature Scheme for WSN.
J. Networks, 2012

On the 2-Adic Complexity of Periodic Binary Sequences.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012

An efficient and secure mobile payment protocol for restricted connectivity scenarios in vehicular ad hoc network.
Comput. Commun., 2012

An Anonymous Password-Authenticated and Key Exchange Protocol for Roaming Services in Wireless Networks.
Ad Hoc Sens. Wirel. Networks, 2012

An efficient Public Key Encryption with Conjunctive Keyword Search scheme based on pairings.
Proceedings of the 3rd IEEE International Conference on Network Infrastructure and Digital Content, 2012

2011
Analysis and improvement of a strongly secure certificateless key exchange protocol without pairing
CoRR, 2011

Certificateless multi-proxy signature.
Comput. Commun., 2011

2010
A supplement to Liu et al.'s certificateless signcryption scheme in the standard model.
IACR Cryptol. ePrint Arch., 2010

An improved semantically-secure identity-based signcryption scheme in the standard model.
Comput. Electr. Eng., 2010

2008
An Efficient and Provably-Secure Identity-based Signcryption Scheme for Multiple PKGs.
IACR Cryptol. ePrint Arch., 2008

1990
An Interactive Colour Line Recognition System for Seismic Section Digitisation.
Proceedings of IAPR Workshop on Machine Vision Applications, 1990

A head called Richard.
Proceedings of the British Machine Vision Conference, 1990

1989
Model Based Tissue Differentiation in MR Brain Images.
Proceedings of the Alvey Vision Conference, 1989

1987
An appropriate representation for early vision.
Pattern Recognit. Lett., 1987

1986
Implementation for noise suppression in images.
Image Vis. Comput., 1986


  Loading...