Search

Your search keyword '"Zhenfu Cao"' showing total 111 results

Search Constraints

Start Over You searched for: Author "Zhenfu Cao" Remove constraint Author: "Zhenfu Cao" Publisher ieee Remove constraint Publisher: ieee
111 results on '"Zhenfu Cao"'

Search Results

1. IPO-PEKS: Effective Inner Product Outsourcing Public Key Searchable Encryption From Lattice in the IoT

2. Autonomous Path Identity-Based Broadcast Proxy Re-Encryption for Data Sharing in Clouds

8. PPHR: Blockchain-based Privacy Protection House Rental System

9. Practical and Secure Circular Range Search on Private Spatial Data

10. VCKSCF: Efficient Verifiable Conjunctive Keyword Search Based on Cuckoo Filter for Cloud Storage

11. Unbounded Key-Policy Attribute-Based Encryption with Black-Box Traceability

12. Efficient and privacy-protected content-based image retrieval without homomorphic encryption

13. A Verifiable Dynamic Multi-user Searchable Encryption Scheme without Trusted Third Parties

14. A Revocable Publish-Subscribe Scheme Using CP-ABE with Efficient Attribute and User Revocation Capability for Cloud Systems

15. PPSAS: Lightweight Privacy-preserving Spectrum Aggregation and Auction in Cognitive Radio Networks

16. Metrics for Graph Partition by Using Machine Learning Techniques

17. Revocable Public Key Encryption with Authorized Keyword Search

18. Detecting Vehicle Anomaly by Sensor Consistency: An Edge Computing Based Mechanism

19. VEPP:A Verifiable, Highly Efficient and Privacy-Preserving Protocol for Outsourcing Large Matrix Multiplication

20. A Privacy Preserving Public-Key Searchable Encryption Scheme with Fast Keyword Search

21. Outsourcing attribute-based encryption with multi-keywords and similarity ranking search

22. Position-based proxy signcryption

23. EVOC: More efficient verifiable outsourced computation from any one-way trapdoor function

24. An ElGamal-based efficient and privacy-preserving data aggregation scheme for smart grid

25. Sybil-aware least cost rumor blocking in social networks

26. User self-controllable profile matching for privacy-preserving mobile social networks

27. Proxy multi-signature binding positioning protocol

28. Location privacy in database-driven Cognitive Radio Networks: Attacks and countermeasures

29. Two-level path authentication in EPCglobal Network

30. EPF: An Event-Aided Packet Forwarding Protocol for Privacy-Preserving Mobile Healthcare Social Networks

31. MobiGame: A User-Centric Reputation Based Incentive Protocol for Delay/Disruption Tolerant Networks

32. Efficient trust based information sharing schemes over distributed collaborative networks

33. Novel conic-based group signature scheme with revocation

34. Efficient and secure electronic resume using smart cards

35. Multi-Use Unidirectional Proxy Re-Encryption

36. Efficient signature-encryption scheme for mobile computation

37. L-WMxD: Lexical based Webmail XSS Discoverer

38. SDSM: A secure data service mechanism in mobile cloud computing

39. An Opportunistic Batch Bundle Authentication Scheme for Energy Constrained DTNs

40. Some basic principles for proxy signature schemes based on ECDLP

41. Extended attribute based encryption for private information retrieval

42. About the security for HW threshold proxy signature scheme with self-certified public key system

43. An Insider-Resistant Group Key Exchange Protocol without Signatures

44. Certificateless Threshold Signature for Data Report Authentication in Mobile Ad Hoc Network

45. Threshold Proxy Re-Signature

46. A New Dynamic Group Key Management Scheme with Low Rekeying Cost

47. Multi-Receiver Identity-Based Encryption in Multiple PKG Environment

48. ASRPAKE: An Anonymous Secure Routing Protocol with Authenticated Key Exchange for Wireless Ad Hoc Networks

49. Crypanalysis of Kuo and Chen's Threshold Proxy Signature Scheme Based on the RSA

50. A Novel Compromise-Resilient Authentication System for Wireless Mesh Networks

Catalog

Books, media, physical & digital resources