Zhihua Zheng

According to our database1, Zhihua Zheng authored at least 26 papers between 2006 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2021
SemicNet: a semicircular network for the segmentation of the liver and its lesions.
Int. J. Sens. Networks, 2021

2020
An Efficient Outsourced Oblivious Transfer Extension Protocol and Its Applications.
Secur. Commun. Networks, 2020

Energy-efficient renewable scheme for rechargeable sensor networks.
EURASIP J. Wirel. Commun. Netw., 2020

Permutable Cut-and-Choose Oblivious Transfer and Its Application.
IEEE Access, 2020

2019
ID-Based Strong Designated Verifier Signature over ℛ-SIS Assumption.
Secur. Commun. Networks, 2019

Privacy preserved wireless sensor location protocols based on mobile edge computing.
Comput. Secur., 2019

An Efficient Strong Designated Verifier Signature Based on ℛ-SIS Assumption.
IEEE Access, 2019

A Renewable Charging Approach with Low Energy Consumption in Wireless Sensor Networks.
Proceedings of the 19th IEEE International Conference on Communication Technology, 2019

2018
Fuzzy matching and direct revocation: a new CP-ABE scheme from multilinear maps.
Soft Comput., 2018

A New Post-Quantum Blind Signature From Lattice Assumptions.
IEEE Access, 2018

A Provably-Secure Two-Factor Authenticated Key Exchange Protocol with Stronger Anonymity.
Proceedings of the Network and System Security - 12th International Conference, 2018

2017
Verifiable outsourced ciphertext-policy attribute-based encryption in cloud computing.
Soft Comput., 2017

Cloud-aided online/offline ciphertext-policy attribute-based encryption in the standard model.
Int. J. Grid Util. Comput., 2017

An Adaptive Sweep-Circle Spatial Clustering Algorithm Based on Gestalt.
ISPRS Int. J. Geo Inf., 2017

New directly revocable attribute-based encryption scheme and its application in cloud storage environment.
Clust. Comput., 2017

2016
New large-universe multi-authority ciphertext-policy ABE scheme and its application in cloud storage systems.
J. High Speed Networks, 2016

2015
Fair Secure Computation with Reputation Assumptions in the Mobile Social Networks.
Mob. Inf. Syst., 2015

New identity-based key-encapsulation mechanism and its applications in cloud computing.
Int. J. High Perform. Comput. Netw., 2015

2014
Hierarchial Identity-Based Encryption Scheme from Multilinear Maps.
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014

2013
Identity-Based Key-Encapsulation Mechanism from Multilinear Maps.
IACR Cryptol. ePrint Arch., 2013

A New Privacy-Preserving Broadcast Encryption Scheme from DPVS.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

2012
A Provably Secure Identity-Based Key Agreement Protocol from Key Encapsulation Scheme.
Proceedings of the Eighth International Conference on Computational Intelligence and Security, 2012

2009
OCDMA over WDM System Based on Chebyshev-Map Chaotic Spread Spectrum in Passive Optical Network.
Proceedings of the CSIE 2009, 2009 WRI World Congress on Computer Science and Information Engineering, March 31, 2009

2008
Average power control algorithm with dynamic channel assignment for TDD-CDMA systems.
Proceedings of the 2008 International Conference on Advanced Infocomm Technology, 2008

2007
Growth Analysis and CUSSIM Model in Cucumber Seedling.
Proceedings of the Workshop on Intelligent Information Technology Application, 2007

2006
A study on a single-unit Markov repairable system with repair time omission.
IEEE Trans. Reliab., 2006


  Loading...