Zhihua Zheng

According to our database1, Zhihua Zheng authored at least 26 papers between 2006 and 2021.

Collaborative distances:



In proceedings 
PhD thesis 


On csauthors.net:


SemicNet: a semicircular network for the segmentation of the liver and its lesions.
Int. J. Sens. Networks, 2021

An Efficient Outsourced Oblivious Transfer Extension Protocol and Its Applications.
Secur. Commun. Networks, 2020

Energy-efficient renewable scheme for rechargeable sensor networks.
EURASIP J. Wirel. Commun. Netw., 2020

Permutable Cut-and-Choose Oblivious Transfer and Its Application.
IEEE Access, 2020

ID-Based Strong Designated Verifier Signature over ℛ-SIS Assumption.
Secur. Commun. Networks, 2019

Privacy preserved wireless sensor location protocols based on mobile edge computing.
Comput. Secur., 2019

An Efficient Strong Designated Verifier Signature Based on ℛ-SIS Assumption.
IEEE Access, 2019

A Renewable Charging Approach with Low Energy Consumption in Wireless Sensor Networks.
Proceedings of the 19th IEEE International Conference on Communication Technology, 2019

Fuzzy matching and direct revocation: a new CP-ABE scheme from multilinear maps.
Soft Comput., 2018

A New Post-Quantum Blind Signature From Lattice Assumptions.
IEEE Access, 2018

A Provably-Secure Two-Factor Authenticated Key Exchange Protocol with Stronger Anonymity.
Proceedings of the Network and System Security - 12th International Conference, 2018

Verifiable outsourced ciphertext-policy attribute-based encryption in cloud computing.
Soft Comput., 2017

Cloud-aided online/offline ciphertext-policy attribute-based encryption in the standard model.
Int. J. Grid Util. Comput., 2017

An Adaptive Sweep-Circle Spatial Clustering Algorithm Based on Gestalt.
ISPRS Int. J. Geo Inf., 2017

New directly revocable attribute-based encryption scheme and its application in cloud storage environment.
Clust. Comput., 2017

New large-universe multi-authority ciphertext-policy ABE scheme and its application in cloud storage systems.
J. High Speed Networks, 2016

Fair Secure Computation with Reputation Assumptions in the Mobile Social Networks.
Mob. Inf. Syst., 2015

New identity-based key-encapsulation mechanism and its applications in cloud computing.
Int. J. High Perform. Comput. Netw., 2015

Hierarchial Identity-Based Encryption Scheme from Multilinear Maps.
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014

Identity-Based Key-Encapsulation Mechanism from Multilinear Maps.
IACR Cryptol. ePrint Arch., 2013

A New Privacy-Preserving Broadcast Encryption Scheme from DPVS.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

A Provably Secure Identity-Based Key Agreement Protocol from Key Encapsulation Scheme.
Proceedings of the Eighth International Conference on Computational Intelligence and Security, 2012

OCDMA over WDM System Based on Chebyshev-Map Chaotic Spread Spectrum in Passive Optical Network.
Proceedings of the CSIE 2009, 2009 WRI World Congress on Computer Science and Information Engineering, March 31, 2009

Average power control algorithm with dynamic channel assignment for TDD-CDMA systems.
Proceedings of the 2008 International Conference on Advanced Infocomm Technology, 2008

Growth Analysis and CUSSIM Model in Cucumber Seedling.
Proceedings of the Workshop on Intelligent Information Technology Application, 2007

A study on a single-unit Markov repairable system with repair time omission.
IEEE Trans. Reliab., 2006