Search

Your search keyword '"Zhenfu Cao"' showing total 244 results

Search Constraints

Start Over You searched for: Author "Zhenfu Cao" Remove constraint Author: "Zhenfu Cao" Topic business.industry Remove constraint Topic: business.industry
244 results on '"Zhenfu Cao"'

Search Results

1. SAVE: Efficient Privacy-Preserving Location-Based Service Bundle Authentication in Self-Organizing Vehicular Social Networks

2. EPMDA-FED: Efficient and Privacy-Preserving Multidimensional Data Aggregation Scheme With Fast Error Detection in Smart Grid

3. The Secure Lattice-Based Data Aggregation Scheme in Residential Networks for Smart Grid

4. Efficient Privacy-Preserving Outsourced Discrete Wavelet Transform in the Encrypted Domain

5. Encryption Switching Service: Securely Switch Your Encrypted Data to Another Format

6. PADP: Efficient Privacy-Preserving Data Aggregation and Dynamic Pricing for Vehicle-to-Grid Networks

7. Two Secure and Efficient Lightweight Data Aggregation Schemes for Smart Grid

8. SESCF: A Secure and Efficient Supply Chain Framework via Blockchain-Based Smart Contracts

9. Improved File-injection Attacks on Searchable Encryption Using Finite Set Theory

10. Multi-Value-Independent Ciphertext-Policy Attribute Based Encryption with Fast Keyword Search

11. LPPA: Lightweight Privacy-Preserving Authentication From Efficient Multi-Key Secure Outsourced Computation for Location-Based Services in VANETs

12. GTSIM-POP: Game theory based secure incentive mechanism and patient-optimized privacy-preserving packet forwarding scheme in m-healthcare social networks

13. Pri-RTB: Privacy-preserving real-time bidding for securing mobile advertisement in ubiquitous computing

14. AP-PRE: Autonomous Path Proxy Re-Encryption and Its Applications

15. Privacy-preserving outsourced image feature extraction

16. Detecting Vehicle Anomaly in the Edge via Sensor Consistency and Frequency Characteristic

17. Securing Named Data Networking: Attribute-Based Encryption and Beyond

18. Designated Server-Aided Revocable Identity-based Keyword Search on Lattice

19. Practical and Secure Circular Range Search on Private Spatial Data

20. VCKSCF: Efficient Verifiable Conjunctive Keyword Search Based on Cuckoo Filter for Cloud Storage

21. Unbounded Key-Policy Attribute-Based Encryption with Black-Box Traceability

22. Efficient and privacy-protected content-based image retrieval without homomorphic encryption

23. Lightweight Privacy-Preserving Training and Evaluation for Discretized Neural Networks

24. Blockchain Based Digital Evidence Chain of Custody

25. Tight Security Analysis of 3-Round Key-Alternating Cipher with a Single Permutation

26. Anonymous IBE from Quadratic Residuosity with Fast Encryption

27. White-Box Traceable CP-ABE for Cloud Storage Service: How to Catch People Leaking Their Access Credentials Effectively

28. An Effective Verifiable Symmetric Searchable Encryption Scheme in Cloud Computing

29. A Verifiable Dynamic Multi-user Searchable Encryption Scheme without Trusted Third Parties

30. A Revocable Publish-Subscribe Scheme Using CP-ABE with Efficient Attribute and User Revocation Capability for Cloud Systems

31. Proof of Multicopy via Proof of File Position in Cloud

32. Secure and efficient encrypted keyword search for multi-user setting in cloud computing

33. Auditable $\sigma $ -Time Outsourced Attribute-Based Encryption for Access Control in Cloud Computing

34. Accountable CP-ABE with Public Verifiability: How to Effectively Protect the Outsourced Data in Cloud

35. Security and Privacy for Cloud-Based IoT: Challenges

36. PPSAS: Lightweight Privacy-preserving Spectrum Aggregation and Auction in Cognitive Radio Networks

37. Metrics for Graph Partition by Using Machine Learning Techniques

38. Revocable Public Key Encryption with Authorized Keyword Search

39. DMU-ABSE: Dynamic Multi-user Attribute-Based Searchable Encryption with File Deletion and User Revocation

40. SDKSE-KGA: A Secure Dynamic Keyword Searchable Encryption Scheme Against Keyword Guessing Attacks

41. VEPP:A Verifiable, Highly Efficient and Privacy-Preserving Protocol for Outsourcing Large Matrix Multiplication

42. SDKSE:A Secure Dynamic Keyword Searchable Encryption Scheme for Email Systems

43. Multi-proxy multi-signature binding positioning protocol

44. Almost-Tight Identity Based Encryption Against Selective Opening Attack

45. Secure and privacy-preserving pattern matching in outsourced computing

46. Serial number based encryption and its application for mobile social networks

47. Attribute-based signcryption with hybrid access policy

48. PPDM: A Privacy-Preserving Protocol for Cloud-Assisted e-Healthcare Systems

49. PVIDM: Privacy-preserving verifiable shape context based image denoising and matching with efficient outsourcing in the malicious setting

50. Dynamic searchable symmetric encryption schemes with forward and backward security

Catalog

Books, media, physical & digital resources