Search

Your search keyword '"Zhenfu Cao"' showing total 191 results

Search Constraints

Start Over You searched for: Author "Zhenfu Cao" Remove constraint Author: "Zhenfu Cao" Topic computer.software_genre Remove constraint Topic: computer.software_genre
191 results on '"Zhenfu Cao"'

Search Results

1. Encryption Switching Service: Securely Switch Your Encrypted Data to Another Format

2. SESCF: A Secure and Efficient Supply Chain Framework via Blockchain-Based Smart Contracts

3. Multi-Value-Independent Ciphertext-Policy Attribute Based Encryption with Fast Keyword Search

4. Blockchain-Based Lightweight Certificate Authority for Efficient Privacy-Preserving Location-Based Service in Vehicular Social Networks

5. A verifiable privacy-preserving data collection scheme supporting multi-party computation in fog-based smart grid

6. PPHR: Blockchain-based Privacy Protection House Rental System

7. Privacy-preserving outsourced image feature extraction

8. Smart contract for secure billing in ride-hailing service via blockchain

9. VCKSCF: Efficient Verifiable Conjunctive Keyword Search Based on Cuckoo Filter for Cloud Storage

10. Unbounded Key-Policy Attribute-Based Encryption with Black-Box Traceability

11. Efficient and privacy-protected content-based image retrieval without homomorphic encryption

12. A Blockchain-Based Privacy-Preserving Scheme for Smart Grids

13. Blockchain Based Digital Evidence Chain of Custody

14. White-Box Traceable CP-ABE for Cloud Storage Service: How to Catch People Leaking Their Access Credentials Effectively

15. An Effective Verifiable Symmetric Searchable Encryption Scheme in Cloud Computing

16. A Revocable Publish-Subscribe Scheme Using CP-ABE with Efficient Attribute and User Revocation Capability for Cloud Systems

17. Secure and efficient encrypted keyword search for multi-user setting in cloud computing

18. Auditable $\sigma $ -Time Outsourced Attribute-Based Encryption for Access Control in Cloud Computing

19. Accountable CP-ABE with Public Verifiability: How to Effectively Protect the Outsourced Data in Cloud

20. Security and Privacy for Cloud-Based IoT: Challenges

21. Metrics for Graph Partition by Using Machine Learning Techniques

22. Revocable Public Key Encryption with Authorized Keyword Search

23. SDKSE-KGA: A Secure Dynamic Keyword Searchable Encryption Scheme Against Keyword Guessing Attacks

24. VEPP:A Verifiable, Highly Efficient and Privacy-Preserving Protocol for Outsourcing Large Matrix Multiplication

25. SDKSE:A Secure Dynamic Keyword Searchable Encryption Scheme for Email Systems

26. Multi-proxy multi-signature binding positioning protocol

27. Secure and privacy-preserving pattern matching in outsourced computing

28. Attribute-based signcryption with hybrid access policy

29. PPDM: A Privacy-Preserving Protocol for Cloud-Assisted e-Healthcare Systems

30. PVIDM: Privacy-preserving verifiable shape context based image denoising and matching with efficient outsourcing in the malicious setting

31. Efficient White-Box Traceable ABE for Vehicular Networks

32. Efficient Multi-keyword Searchable Encryption Based on Multi-input Inner-Product Functional Encryption

33. Server-Aided Directly Revocable Ciphertext-Policy Attribute-Based Encryption with Verifiable Delegation

34. PPOIM: Privacy-Preserving Shape Context Based Image Denoising and Matching with Efficient Outsourcing

35. 4S: A secure and privacy-preserving key management scheme for cloud-assisted wireless body area network in m-healthcare social networks

36. White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Flexible Attributes

37. PSMPA: Patient Self-Controllable and Multi-Level Privacy-Preserving Cooperative Authentication in Distributedm-Healthcare Cloud Computing System

38. Security and privacy in cloud-assisted wireless wearable communications: Challenges, solutions, and future directions

39. Traceable CP-ABE: How to Trace Decryption Devices Found in the Wild

40. Accountable Multi-authority Ciphertext-Policy Attribute-Based Encryption Without Key Escrow and Key Abuse

41. ReDD: recommendation-based data dissemination in privacy-preserving mobile social networks

42. Human-Factor-Aware Privacy-Preserving Aggregation in Smart Grid

43. PDAFT: A privacy-preserving data aggregation scheme with fault tolerance for smart grid communications

44. Security and privacy for storage and computation in cloud computing

45. Guest Editors' Introduction: Special Issue on Trust, Security, and Privacy in Parallel and Distributed Systems

46. Outsourcing attribute-based encryption with multi-keywords and similarity ranking search

47. Traceable and undeniable ciphertext-policy attribute-based encryption for cloud storage service

48. CryptCloud+: Secure and Expressive Data Access Control for Cloud Storage

49. Generalized (identity-based) hash proof system and its applications

50. On the Privacy of Khan et al.'s Dynamic ID-Based Remote Authentication Scheme with User Anonymity

Catalog

Books, media, physical & digital resources