Search

Your search keyword '"Zhenfu Cao"' showing total 180 results

Search Constraints

Start Over You searched for: Author "Zhenfu Cao" Remove constraint Author: "Zhenfu Cao" Topic computer security Remove constraint Topic: computer security
180 results on '"Zhenfu Cao"'

Search Results

1. Encryption Switching Service: Securely Switch Your Encrypted Data to Another Format

2. SESCF: A Secure and Efficient Supply Chain Framework via Blockchain-Based Smart Contracts

3. Multi-Value-Independent Ciphertext-Policy Attribute Based Encryption with Fast Keyword Search

4. Blockchain-Based Lightweight Certificate Authority for Efficient Privacy-Preserving Location-Based Service in Vehicular Social Networks

5. PPHR: Blockchain-based Privacy Protection House Rental System

6. Unbounded Key-Policy Attribute-Based Encryption with Black-Box Traceability

7. A Blockchain-Based Privacy-Preserving Scheme for Smart Grids

8. Blockchain Based Digital Evidence Chain of Custody

9. Smart contract for secure billing in ride-hailing service via blockchain

10. White-Box Traceable CP-ABE for Cloud Storage Service: How to Catch People Leaking Their Access Credentials Effectively

11. An Effective Verifiable Symmetric Searchable Encryption Scheme in Cloud Computing

12. A Revocable Publish-Subscribe Scheme Using CP-ABE with Efficient Attribute and User Revocation Capability for Cloud Systems

13. Secure and efficient encrypted keyword search for multi-user setting in cloud computing

14. Auditable $\sigma $ -Time Outsourced Attribute-Based Encryption for Access Control in Cloud Computing

15. Accountable CP-ABE with Public Verifiability: How to Effectively Protect the Outsourced Data in Cloud

16. Security and Privacy for Cloud-Based IoT: Challenges

17. Revocable Public Key Encryption with Authorized Keyword Search

18. SDKSE-KGA: A Secure Dynamic Keyword Searchable Encryption Scheme Against Keyword Guessing Attacks

19. Multi-proxy multi-signature binding positioning protocol

20. Secure and privacy-preserving pattern matching in outsourced computing

21. VEPP:A Verifiable, Highly Efficient and Privacy-Preserving Protocol for Outsourcing Large Matrix Multiplication

22. SDKSE:A Secure Dynamic Keyword Searchable Encryption Scheme for Email Systems

23. Efficient White-Box Traceable ABE for Vehicular Networks

24. Server-Aided Directly Revocable Ciphertext-Policy Attribute-Based Encryption with Verifiable Delegation

25. Attribute-based signcryption with hybrid access policy

26. PPDM: A Privacy-Preserving Protocol for Cloud-Assisted e-Healthcare Systems

27. 4S: A secure and privacy-preserving key management scheme for cloud-assisted wireless body area network in m-healthcare social networks

28. White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Flexible Attributes

29. PSMPA: Patient Self-Controllable and Multi-Level Privacy-Preserving Cooperative Authentication in Distributedm-Healthcare Cloud Computing System

30. Security and privacy in cloud-assisted wireless wearable communications: Challenges, solutions, and future directions

31. Traceable CP-ABE: How to Trace Decryption Devices Found in the Wild

32. Accountable Multi-authority Ciphertext-Policy Attribute-Based Encryption Without Key Escrow and Key Abuse

33. ReDD: recommendation-based data dissemination in privacy-preserving mobile social networks

34. Human-Factor-Aware Privacy-Preserving Aggregation in Smart Grid

35. PDAFT: A privacy-preserving data aggregation scheme with fault tolerance for smart grid communications

36. Security and privacy for storage and computation in cloud computing

37. Guest Editors' Introduction: Special Issue on Trust, Security, and Privacy in Parallel and Distributed Systems

38. Traceable and undeniable ciphertext-policy attribute-based encryption for cloud storage service

39. CryptCloud+: Secure and Expressive Data Access Control for Cloud Storage

40. Generalized (identity-based) hash proof system and its applications

41. On the Privacy of Khan et al.'s Dynamic ID-Based Remote Authentication Scheme with User Anonymity

42. Certificate-based proxy decryption systems with revocability in the standard model

43. Efficient Trust Based Information Sharing Schemes over Distributed Collaborative Networks

44. Securing m-healthcare social networks: challenges, countermeasures and future directions

45. Practical identity-based encryption in multiple private key generator (PKG) environments

46. White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Any Monotone Access Structures

47. Outsourcing attribute-based encryption with multi-keywords and similarity ranking search

48. PPOPM: More Efficient Privacy Preserving Outsourced Pattern Matching

49. Traceable CP-ABE with Short Ciphertexts: How to Catch People Selling Decryption Devices on eBay Efficiently

50. Efficient Asymmetric Index Encapsulation Scheme for Named Data

Catalog

Books, media, physical & digital resources