Zhengtao Jiang

Orcid: 0000-0001-5888-2163

According to our database1, Zhengtao Jiang authored at least 33 papers between 2005 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Private Set Intersection Based on Lightweight Oblivious Key-Value Storage Structure.
Symmetry, November, 2023

2022
A Practical Detection and Defense Scheme Against Smart Contract Attacks Based on Transaction Features.
Proceedings of the Mobile Internet Security - 6th International Symposium, 2022

Improved Protocol of Yao's Millionaires Problem.
Proceedings of the 22nd IEEE/ACIS International Conference on Computer and Information Science, 2022

2020
On the Security of a Practical Constant-Size Ring Signature Scheme.
Int. J. Netw. Secur., 2020

2019
Identity-and-data privacy forward security public auditing protocol in the standard model.
Int. J. Commun. Syst., 2019

A Campus Carpooling System Based on GPS Trajectories.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2019

An Efficient Key-Aggregate Keyword Searchable Encryption for Data Sharing in Cloud Storage.
Proceedings of the 2019 IEEE Globecom Workshops, Waikoloa, HI, USA, December 9-13, 2019, 2019

2018
Research on oblivious keyword search protocols with CKA security.
Int. J. Commun. Syst., 2018

2017
Research on Sentiment Analysis of Online Public Opinion Based on Semantic.
Proceedings of the Geo-Spatial Knowledge and Intelligence - 5th International Conference, 2017

2016
Linear Complexity of a Family of Pseudorandom Discrete Logarithm Threshold Sequences.
Int. J. Netw. Secur., 2016

Research on software reliability evaluation technology based on BP neural network.
Proceedings of the 15th IEEE/ACIS International Conference on Computer and Information Science, 2016

A hybrid news recommendation algorithm based on user's browsing path.
Proceedings of the 15th IEEE/ACIS International Conference on Computer and Information Science, 2016

2015
Research and implementation of four-prime RSA digital signature algorithm.
Proceedings of the 14th IEEE/ACIS International Conference on Computer and Information Science, 2015

2014
Versatile identity-based signatures for authentication in multi-user settings.
Int. J. Grid Util. Comput., 2014

A note on the Kirchhoff index of bicyclic graphs.
Ars Comb., 2014

2013
A non-delegatable strong designated verifier signature in ID-based setting for mobile environment.
Math. Comput. Model., 2013

A systematic method to design strong designated verifier signature without random oracles.
Clust. Comput., 2013

Secure Cloud Storage Service with an Efficient DOKS Protocol.
Proceedings of the 2013 IEEE International Conference on Services Computing, Santa Clara, CA, USA, June 28, 2013

2012
Progress and Research of Network System Survivability Scheme with Cooperative Information Management.
J. Networks, 2012

A Non-delegatable Strong Designated Verifier Signature without Random Oracles.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

An Efficient Probably CP-CM-Secure Identity-Based Signature Scheme Applicable to Authentication in Multiuser Settings.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

An Efficient Identity-Based Strong Designated Verifier Signature without Delegatability.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

An Object-oriented Fine-grained RBAC Model.
Proceedings of the Fifth International Joint Conference on Computational Sciences and Optimization, 2012

2011
Research on Attribute-Based Trust Elevation Problems in P2P Environment.
Int. J. Pattern Recognit. Artif. Intell., 2011

Non-delegatable Strong Designated Verifier Signature on Elliptic Curves.
Proceedings of the Information Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea, November 30, 2011

Non-interactive Deniable Authentication Protocols.
Proceedings of the Information Security and Cryptology - 7th International Conference, 2011

2009
Investigations on Simultaneously Secure IBE Scheme and Security Proofs under RO and Non-RO Model.
Intell. Inf. Manag., 2009

Investigations on smart card-based secure protocols for autenticated key establishment in Digital pay-TV systems.
Proceedings of the 8th IEEE International Conference on Cognitive Informatics, 2009

2007
Short Group Signatures Without Random Oracles.
J. Comput. Sci. Technol., 2007

2005
Two methods of directly constructing probabilistic public-key encryption primitives based on third-order LFSR sequences.
Appl. Math. Comput., 2005

A research on new public-key encryption schemes.
Appl. Math. Comput., 2005

Security analysis and improvement of a double-trapdoor encryption scheme.
Appl. Math. Comput., 2005

Ring-Based Anonymous Fingerprinting Scheme.
Proceedings of the Computational Intelligence and Security, International Conference, 2005


  Loading...