Zongqu Zhao

Orcid: 0000-0003-3283-2402

According to our database1, Zongqu Zhao authored at least 9 papers between 2013 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Post-quantum secure two-party computing protocols against malicious adversaries.
Concurr. Comput. Pract. Exp., 2024

2023
Password authentication key exchange based on key consensus for IoT security.
Clust. Comput., February, 2023

2022
An Android Malicious Application Detection Method with Decision Mechanism in the Operating Environment of Blockchain.
Secur. Commun. Networks, 2022

2021
Chapter Four - Provably secure verifier-based password authenticated key exchange based on lattices.
Adv. Comput., 2021

2019
RLWE Commitment-Based Linkable Ring Signature Scheme and Its Application in Blockchain.
Proceedings of the Blockchain and Trustworthy Systems - First International Conference, 2019

2018
Efficient Group Signature Scheme Over NTRU Lattice.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

Adaptively Chosen Ciphertext Secure Lattice IBE Based Programmable Hash Function in the Standard Model.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

2014
Malware detection method based on the control-flow construct feature of software.
IET Inf. Secur., 2014

2013
An unknown malware detection scheme based on the features of graph.
Secur. Commun. Networks, 2013


  Loading...