Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Dong Zheng 0001
@article{DBLP:journals/tcom/Gao000T24, author = {Chan Gao and Bin Yang and Dong Zheng and Xiaohong Jiang and Tarik Taleb}, title = {Cooperative Jamming and Relay Selection for Covert Communications in Wireless Relay Systems}, journal = {{IEEE} Trans. Commun.}, volume = {72}, number = {2}, pages = {1020--1032}, year = {2024}, url = {https://doi.org/10.1109/TCOMM.2023.3327272}, doi = {10.1109/TCOMM.2023.3327272}, timestamp = {Sat, 16 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcom/Gao000T24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2403-09475, author = {Chan Gao and Linying Tian and Dong Zheng}, title = {Covert Communication for Untrusted UAV-Assisted Wireless Systems}, journal = {CoRR}, volume = {abs/2403.09475}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2403.09475}, doi = {10.48550/ARXIV.2403.09475}, eprinttype = {arXiv}, eprint = {2403.09475}, timestamp = {Fri, 05 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2403-09475.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/LiZZQ23, author = {Le Li and Dong Zheng and Haoyu Zhang and Baodong Qin}, title = {Data Secure De-Duplication and Recovery Based on Public Key Encryption With Keyword Search}, journal = {{IEEE} Access}, volume = {11}, pages = {28688--28698}, year = {2023}, url = {https://doi.org/10.1109/ACCESS.2023.3251370}, doi = {10.1109/ACCESS.2023.3251370}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/LiZZQ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dam/ZhaoLCQZ23, author = {Qinglan Zhao and Mengran Li and Zhixiong Chen and Baodong Qin and Dong Zheng}, title = {A unified construction of weightwise perfectly balanced Boolean functions}, journal = {Discret. Appl. Math.}, volume = {337}, pages = {190--201}, year = {2023}, url = {https://doi.org/10.1016/j.dam.2023.04.021}, doi = {10.1016/J.DAM.2023.04.021}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dam/ZhaoLCQZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijis/Liu0HC0023, author = {Wei Liu and Yinghui Zhang and Gang Han and Jin Cao and Hui Cui and Dong Zheng}, title = {Secure and Efficient Smart Healthcare System Based on Federated Learning}, journal = {Int. J. Intell. Syst.}, volume = {2023}, pages = {1--12}, year = {2023}, url = {https://doi.org/10.1155/2023/8017489}, doi = {10.1155/2023/8017489}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijis/Liu0HC0023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsa/FanQZ23, author = {Yajun Fan and Baodong Qin and Dong Zheng}, title = {A lattice-based designated-server public-key authenticated encryption with keyword search}, journal = {J. Syst. Archit.}, volume = {145}, pages = {103031}, year = {2023}, url = {https://doi.org/10.1016/j.sysarc.2023.103031}, doi = {10.1016/J.SYSARC.2023.103031}, timestamp = {Tue, 02 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsa/FanQZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcc/WangLLZ23, author = {Qian Wang and Chengzhe Lai and Rongxing Lu and Dong Zheng}, title = {Searchable Encryption With Autonomous Path Delegation Function and Its Application in Healthcare Cloud}, journal = {{IEEE} Trans. Cloud Comput.}, volume = {11}, number = {1}, pages = {879--896}, year = {2023}, url = {https://doi.org/10.1109/TCC.2021.3120110}, doi = {10.1109/TCC.2021.3120110}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcc/WangLLZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LaiMLZZ23, author = {Chengzhe Lai and Yixiao Ma and Rongxing Lu and Yinghui Zhang and Dong Zheng}, title = {A Novel Authentication Scheme Supporting Multiple User Access for 5G and Beyond}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {20}, number = {4}, pages = {2970--2987}, year = {2023}, url = {https://doi.org/10.1109/TDSC.2022.3198723}, doi = {10.1109/TDSC.2022.3198723}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LaiMLZZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tits/WangLHZ23, author = {Qian Wang and Chengzhe Lai and Gang Han and Dong Zheng}, title = {pdRide: Privacy-Preserving Distributed Online Ride-Hailing Matching Scheme}, journal = {{IEEE} Trans. Intell. Transp. Syst.}, volume = {24}, number = {11}, pages = {12491--12505}, year = {2023}, url = {https://doi.org/10.1109/TITS.2023.3286804}, doi = {10.1109/TITS.2023.3286804}, timestamp = {Thu, 09 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tits/WangLHZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/ZhangDCHZ23, author = {Yinghui Zhang and Hao Du and Jin Cao and Gang Han and Dong Zheng}, editor = {Chunpeng Ge and Moti Yung}, title = {DP-Loc: {A} Differential Privacy-Based Indoor Localization Scheme with Bilateral Privacy Protection}, booktitle = {Information Security and Cryptology - 19th International Conference, Inscrypt 2023, Hangzhou, China, December 9-10, 2023, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14527}, pages = {293--304}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-97-0945-8\_16}, doi = {10.1007/978-981-97-0945-8\_16}, timestamp = {Mon, 11 Mar 2024 15:20:47 +0100}, biburl = {https://dblp.org/rec/conf/cisc/ZhangDCHZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccchina/LaiLLZ23, author = {Chengzhe Lai and Meng Li and Guanjie Li and Dong Zheng}, title = {Efficient Group Authentication and Key Agreement Scheme for Vehicular Digital Twin}, booktitle = {{IEEE/CIC} International Conference on Communications in China, {ICCC} 2023, Dalian, China, August 10-12, 2023}, pages = {1--6}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICCC57788.2023.10233652}, doi = {10.1109/ICCC57788.2023.10233652}, timestamp = {Wed, 13 Sep 2023 08:43:35 +0200}, biburl = {https://dblp.org/rec/conf/iccchina/LaiLLZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccchina/LaiWMZ23, author = {Chengzhe Lai and Hao Wang and Haoyan Ma and Dong Zheng}, title = {Blockchain-based Multi-Factor Group Authentication in Metaverse}, booktitle = {{IEEE/CIC} International Conference on Communications in China, {ICCC} 2023, Dalian, China, August 10-12, 2023}, pages = {1--6}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICCC57788.2023.10233657}, doi = {10.1109/ICCC57788.2023.10233657}, timestamp = {Wed, 13 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccchina/LaiWMZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhaoLCQZ23, author = {Qinglan Zhao and Mengran Li and Zhixiong Chen and Baodong Qin and Dong Zheng}, title = {A unified construction of weightwise perfectly balanced Boolean functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {460}, year = {2023}, url = {https://eprint.iacr.org/2023/460}, timestamp = {Mon, 05 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhaoLCQZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/ZhengZLCZ22, author = {Xiaokun Zheng and Yanqi Zhao and Huilin Li and Ruonan Chen and Dong Zheng}, title = {Blockchain-based verifiable privacy-preserving data classification protocol for medical data}, journal = {Comput. Stand. Interfaces}, volume = {82}, pages = {103605}, year = {2022}, url = {https://doi.org/10.1016/j.csi.2021.103605}, doi = {10.1016/J.CSI.2021.103605}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csi/ZhengZLCZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcloudc/ZhouLGMZ22, author = {Qian Zhou and Chengzhe Lai and Qili Guo and Haoyan Ma and Dong Zheng}, title = {A novel privacy protection scheme for internet of things based on blockchain and privacy set intersection technique}, journal = {J. Cloud Comput.}, volume = {11}, pages = {93}, year = {2022}, url = {https://doi.org/10.1186/s13677-022-00375-6}, doi = {10.1186/S13677-022-00375-6}, timestamp = {Thu, 05 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcloudc/ZhouLGMZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jksucis/ZhangWCNYZ22, author = {Yinghui Zhang and Xuanni Wei and Jin Cao and Jianting Ning and Zuobin Ying and Dong Zheng}, title = {Blockchain-Enabled decentralized Attribute-Based access control with policy hiding for smart healthcare}, journal = {J. King Saud Univ. Comput. Inf. Sci.}, volume = {34}, number = {10 Part {A}}, pages = {8350--8361}, year = {2022}, url = {https://doi.org/10.1016/j.jksuci.2022.08.015}, doi = {10.1016/J.JKSUCI.2022.08.015}, timestamp = {Fri, 17 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jksucis/ZhangWCNYZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ppna/LaiMGZ22, author = {Chengzhe Lai and Zhe Ma and Rui Guo and Dong Zheng}, title = {Secure medical data sharing scheme based on traceable ring signature and blockchain}, journal = {Peer-to-Peer Netw. Appl.}, volume = {15}, number = {3}, pages = {1562--1576}, year = {2022}, url = {https://doi.org/10.1007/s12083-022-01303-w}, doi = {10.1007/S12083-022-01303-W}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ppna/LaiMGZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvt/LiLLZ22, author = {Guanjie Li and Chengzhe Lai and Rongxing Lu and Dong Zheng}, title = {SecCDV: {A} Security Reference Architecture for Cybertwin-Driven 6G {V2X}}, journal = {{IEEE} Trans. Veh. Technol.}, volume = {71}, number = {5}, pages = {4535--4550}, year = {2022}, url = {https://doi.org/10.1109/TVT.2021.3133308}, doi = {10.1109/TVT.2021.3133308}, timestamp = {Thu, 02 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tvt/LiLLZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/css/LiZLNZ22, author = {Yifei Li and Yinghui Zhang and Wei Liu and Jianting Ning and Dong Zheng}, editor = {Xiaofeng Chen and Jian Shen and Willy Susilo}, title = {A Collaborative Access Control Scheme Based on Incentive Mechanisms}, booktitle = {Cyberspace Safety and Security - 14th International Symposium, {CSS} 2022, Xi'an, China, October 16-18, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13547}, pages = {48--55}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-18067-5\_4}, doi = {10.1007/978-3-031-18067-5\_4}, timestamp = {Mon, 21 Nov 2022 12:53:24 +0100}, biburl = {https://dblp.org/rec/conf/css/LiZLNZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccchina/LaiWZ22, author = {Chengzhe Lai and Menghua Wang and Dong Zheng}, title = {{SPDT:} Secure and Privacy-Preserving Scheme for Digital Twin-based Traffic Control}, booktitle = {{IEEE/CIC} International Conference on Communications in China, {ICCC} 2022, Sanshui, Foshan, China, August 11-13, 2022}, pages = {144--149}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICCC55456.2022.9880784}, doi = {10.1109/ICCC55456.2022.9880784}, timestamp = {Tue, 04 Oct 2022 22:39:13 +0200}, biburl = {https://dblp.org/rec/conf/iccchina/LaiWZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/ZhangWCZCJ21, author = {Yinghui Zhang and Axin Wu and Zhenwei Chen and Dong Zheng and Jin Cao and Xiaohong Jiang}, title = {Flexible and anonymous network slicing selection for {C-RAN} enabled 5G service authentication}, journal = {Comput. Commun.}, volume = {166}, pages = {165--173}, year = {2021}, url = {https://doi.org/10.1016/j.comcom.2020.12.014}, doi = {10.1016/J.COMCOM.2020.12.014}, timestamp = {Fri, 20 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comcom/ZhangWCZCJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/0002DXSL020, author = {Yinghui Zhang and Robert H. Deng and Shengmin Xu and Jianfei Sun and Qi Li and Dong Zheng}, title = {Attribute-based Encryption for Cloud Computing Access Control: {A} Survey}, journal = {{ACM} Comput. Surv.}, volume = {53}, number = {4}, pages = {83:1--83:41}, year = {2021}, url = {https://doi.org/10.1145/3398036}, doi = {10.1145/3398036}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csur/0002DXSL020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ett/LaiLZ21, author = {Chengzhe Lai and Guanjie Li and Dong Zheng}, title = {{SPSC:} {A} secure and privacy-preserving autonomous platoon setup and communication scheme}, journal = {Trans. Emerg. Telecommun. Technol.}, volume = {32}, number = {9}, year = {2021}, url = {https://doi.org/10.1002/ett.3982}, doi = {10.1002/ETT.3982}, timestamp = {Tue, 05 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ett/LaiLZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/GuoYSZZ21, author = {Rui Guo and Geng Yang and Huixian Shi and Yinghui Zhang and Dong Zheng}, title = {O\({}^{\mbox{3}}\)-R-CP-ABE: An Efficient and Revocable Attribute-Based Encryption Scheme in the Cloud-Assisted IoMT System}, journal = {{IEEE} Internet Things J.}, volume = {8}, number = {11}, pages = {8949--8963}, year = {2021}, url = {https://doi.org/10.1109/JIOT.2021.3055541}, doi = {10.1109/JIOT.2021.3055541}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/GuoYSZZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/LaiLZZ21, author = {Chengzhe Lai and Qian Li and Haibo Zhou and Dong Zheng}, title = {{SRSP:} {A} Secure and Reliable Smart Parking Scheme With Dual Privacy Preservation}, journal = {{IEEE} Internet Things J.}, volume = {8}, number = {13}, pages = {10619--10630}, year = {2021}, url = {https://doi.org/10.1109/JIOT.2020.3048177}, doi = {10.1109/JIOT.2020.3048177}, timestamp = {Tue, 13 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/LaiLZZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ppna/LaiDGZ21, author = {Chengzhe Lai and Yangyang Du and Qili Guo and Dong Zheng}, title = {A trust-based privacy-preserving friend matching scheme in social Internet of Vehicles}, journal = {Peer-to-Peer Netw. Appl.}, volume = {14}, number = {4}, pages = {2011--2025}, year = {2021}, url = {https://doi.org/10.1007/s12083-021-01140-3}, doi = {10.1007/S12083-021-01140-3}, timestamp = {Mon, 04 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ppna/LaiDGZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/WangZZ21, author = {Huimin Wang and Dong Zheng and Qinglan Zhao}, title = {Publicly Verifiable Outsourcing Computation for {QR} Decomposition Based on Blockchain}, journal = {Secur. Commun. Networks}, volume = {2021}, pages = {6632518:1--6632518:12}, year = {2021}, url = {https://doi.org/10.1155/2021/6632518}, doi = {10.1155/2021/6632518}, timestamp = {Fri, 30 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/WangZZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/0002DB021, author = {Yinghui Zhang and Robert H. Deng and Elisa Bertino and Dong Zheng}, title = {Robust and Universal Seamless Handover Authentication in 5G HetNets}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {2}, pages = {858--874}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2019.2927664}, doi = {10.1109/TDSC.2019.2927664}, timestamp = {Tue, 23 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/0002DB021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsc/ZhangDLZ21, author = {Yinghui Zhang and Robert H. Deng and Ximeng Liu and Dong Zheng}, title = {Outsourcing Service Fair Payment Based on Blockchain and Its Applications in Cloud Computing}, journal = {{IEEE} Trans. Serv. Comput.}, volume = {14}, number = {4}, pages = {1152--1166}, year = {2021}, url = {https://doi.org/10.1109/TSC.2018.2864191}, doi = {10.1109/TSC.2018.2864191}, timestamp = {Thu, 12 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsc/ZhangDLZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/QinBZCL21, author = {Baodong Qin and Xue Bai and Dong Zheng and Hui Cui and Yiyuan Luo}, editor = {Debin Gao and Qi Li and Xiaohong Guan and Xiaofeng Liao}, title = {Forward-Secure Revocable Identity-Based Encryption}, booktitle = {Information and Communications Security - 23rd International Conference, {ICICS} 2021, Chongqing, China, November 19-21, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12919}, pages = {321--340}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-88052-1\_19}, doi = {10.1007/978-3-030-88052-1\_19}, timestamp = {Mon, 15 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/QinBZCL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/QinCZZ21, author = {Baodong Qin and Hui Cui and Xiaokun Zheng and Dong Zheng}, editor = {Qiong Huang and Yu Yu}, title = {Improved Security Model for Public-Key Authenticated Encryption with Keyword Search}, booktitle = {Provable and Practical Security - 15th International Conference, ProvSec 2021, Guangzhou, China, November 5-8, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13059}, pages = {19--38}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-90402-9\_2}, doi = {10.1007/978-3-030-90402-9\_2}, timestamp = {Mon, 15 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/provsec/QinCZZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/QinLWZ20, author = {Baodong Qin and Ximeng Liu and Zhuo Wei and Dong Zheng}, title = {Space efficient revocable {IBE} for mobile devices in cloud computing}, journal = {Sci. China Inf. Sci.}, volume = {63}, number = {3}, year = {2020}, url = {https://doi.org/10.1007/s11432-018-9455-5}, doi = {10.1007/S11432-018-9455-5}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/chinaf/QinLWZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/ZhangZXXZ20, author = {Yinghui Zhang and Tiantian Zhang and Shengmin Xu and Guowen Xu and Dong Zheng}, title = {Revocable and certificateless public auditing for cloud storage}, journal = {Sci. China Inf. Sci.}, volume = {63}, number = {10}, pages = {1--3}, year = {2020}, url = {https://doi.org/10.1007/s11432-019-2793-y}, doi = {10.1007/S11432-019-2793-Y}, timestamp = {Fri, 08 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/chinaf/ZhangZXXZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdsn/GuoZSZZ20, author = {Rui Guo and Chaoyuan Zhuang and Huixian Shi and Yinghui Zhang and Dong Zheng}, title = {A lightweight verifiable outsourced decryption of attribute-based encryption scheme for blockchain-enabled wireless body area network in fog computing}, journal = {Int. J. Distributed Sens. Networks}, volume = {16}, number = {2}, year = {2020}, url = {https://doi.org/10.1177/1550147720906796}, doi = {10.1177/1550147720906796}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdsn/GuoZSZZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/ZhangMWRZ20, author = {Yinghui Zhang and Xinwei Ma and Axin Wu and Fangyuan Ren and Dong Zheng}, title = {An Efficient Mobile Location-based Service Framework for Resource-constrained Devices}, journal = {Int. J. Netw. Secur.}, volume = {22}, number = {4}, pages = {698--707}, year = {2020}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v22-n4/ijns-2020-v22-n4-p698-707.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/ZhangMWRZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/HuZGWWG20, author = {Chencheng Hu and Dong Zheng and Rui Guo and Axin Wu and Liang Wang and Shiyao Gao}, title = {A Novel Blockchain-based Anonymous Handover Authentication Scheme in Mobile Networks}, journal = {Int. J. Netw. Secur.}, volume = {22}, number = {5}, pages = {874--884}, year = {2020}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v22-n5/ijns-2020-v22-n5-p874-884.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/HuZGWWG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/LaiZCZ20, author = {Chengzhe Lai and Min Zhang and Jie Cao and Dong Zheng}, title = {{SPIR:} {A} Secure and Privacy-Preserving Incentive Scheme for Reliable Real-Time Map Updates}, journal = {{IEEE} Internet Things J.}, volume = {7}, number = {1}, pages = {416--428}, year = {2020}, url = {https://doi.org/10.1109/JIOT.2019.2953188}, doi = {10.1109/JIOT.2019.2953188}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/LaiZCZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/QinCHLZ20, author = {Baodong Qin and Yu Chen and Qiong Huang and Ximeng Liu and Dong Zheng}, title = {Public-key authenticated encryption with keyword search revisited: Security model and constructions}, journal = {Inf. Sci.}, volume = {516}, pages = {515--528}, year = {2020}, url = {https://doi.org/10.1016/j.ins.2019.12.063}, doi = {10.1016/J.INS.2019.12.063}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/QinCHLZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/network/LaiLZS20, author = {Chengzhe Lai and Rongxing Lu and Dong Zheng and Xuemin Sherman Shen}, title = {Security and Privacy Challenges in 5G-Enabled Vehicular Networks}, journal = {{IEEE} Netw.}, volume = {34}, number = {2}, pages = {37--45}, year = {2020}, url = {https://doi.org/10.1109/MNET.001.1900220}, doi = {10.1109/MNET.001.1900220}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/network/LaiLZS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tjs/GuoLZZ20, author = {Rui Guo and Xiong Li and Dong Zheng and Yinghui Zhang}, title = {An attribute-based encryption scheme with multiple authorities on hierarchical personal health record in cloud}, journal = {J. Supercomput.}, volume = {76}, number = {7}, pages = {4884--4903}, year = {2020}, url = {https://doi.org/10.1007/s11227-018-2644-7}, doi = {10.1007/S11227-018-2644-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tjs/GuoLZZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wc/ZhengQLT20, author = {Dong Zheng and Baodong Qin and Yannan Li and Aikui Tian}, title = {Cloud-Assisted Attribute-Based Data Sharing with Efficient User Revocation in the Internet of Things}, journal = {{IEEE} Wirel. Commun.}, volume = {27}, number = {3}, pages = {18--23}, year = {2020}, url = {https://doi.org/10.1109/MWC.001.1900433}, doi = {10.1109/MWC.001.1900433}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wc/ZhengQLT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wicomm/ChiQZ20, author = {Tianyu Chi and Baodong Qin and Dong Zheng}, title = {An Efficient Searchable Public-Key Authenticated Encryption for Cloud-Assisted Medical Internet of Things}, journal = {Wirel. Commun. Mob. Comput.}, volume = {2020}, pages = {8816172:1--8816172:11}, year = {2020}, url = {https://doi.org/10.1155/2020/8816172}, doi = {10.1155/2020/8816172}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wicomm/ChiQZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccchina/LaiW020, author = {Chengzhe Lai and Jinke Wan and Dong Zheng}, title = {Dual Privacy-Preserving Health Data Aggregation Scheme Assisted by Medical Edge Computing}, booktitle = {9th {IEEE/CIC} International Conference on Communications in China, {ICCC} 2020, Chongqing, China, August 9-11, 2020}, pages = {154--159}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ICCC49849.2020.9238932}, doi = {10.1109/ICCC49849.2020.9238932}, timestamp = {Thu, 19 Nov 2020 11:05:15 +0100}, biburl = {https://dblp.org/rec/conf/iccchina/LaiW020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ml4cs/Chen0HHG020, author = {Zhenwei Chen and Yinghui Zhang and Gang Han and Jiangyong He and Rui Guo and Dong Zheng}, editor = {Xiaofeng Chen and Hongyang Yan and Qiben Yan and Xiangliang Zhang}, title = {Cloud-Assisted Privacy Protection for Data Retrieval Against Keyword Guessing Attacks}, booktitle = {Machine Learning for Cyber Security - Third International Conference, {ML4CS} 2020, Guangzhou, China, October 8-10, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12486}, pages = {307--316}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-62223-7\_26}, doi = {10.1007/978-3-030-62223-7\_26}, timestamp = {Thu, 12 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ml4cs/Chen0HHG020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/QinZ19, author = {Baodong Qin and Dong Zheng}, title = {Generic Approach to Outsource the Decryption of Attribute-Based Encryption in Cloud Computing}, journal = {{IEEE} Access}, volume = {7}, pages = {42331--42342}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2907364}, doi = {10.1109/ACCESS.2019.2907364}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/QinZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/GuoSZJZW19, author = {Rui Guo and Huixian Shi and Dong Zheng and Chunming Jing and Chaoyuan Zhuang and Zhengyang Wang}, title = {Flexible and Efficient Blockchain-Based {ABE} Scheme With Multi-Authority for Medical on Demand in Telemedicine System}, journal = {{IEEE} Access}, volume = {7}, pages = {88012--88025}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2925625}, doi = {10.1109/ACCESS.2019.2925625}, timestamp = {Thu, 08 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/GuoSZJZW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ZhangCZGX19, author = {Yinghui Zhang and Chen Chen and Dong Zheng and Rui Guo and Shengmin Xu}, title = {Shared Dynamic Data Audit Supporting Anonymous User Revocation in Cloud Storage}, journal = {{IEEE} Access}, volume = {7}, pages = {113832--113843}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2935180}, doi = {10.1109/ACCESS.2019.2935180}, timestamp = {Wed, 15 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/ZhangCZGX19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ZhangRWZCZ19, author = {Yinghui Zhang and Fangyuan Ren and Axin Wu and Tiantian Zhang and Jin Cao and Dong Zheng}, title = {Certificateless Multi-Party Authenticated Encryption for NB-IoT Terminals in 5G Networks}, journal = {{IEEE} Access}, volume = {7}, pages = {114721--114730}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2936123}, doi = {10.1109/ACCESS.2019.2936123}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/ZhangRWZCZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/GaoZGJH19, author = {Shiyao Gao and Dong Zheng and Rui Guo and Chunming Jing and Chencheng Hu}, title = {An Anti-Quantum E-Voting Protocol in Blockchain With Audit Function}, journal = {{IEEE} Access}, volume = {7}, pages = {115304--115316}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2935895}, doi = {10.1109/ACCESS.2019.2935895}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/GaoZGJH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ZhengJGGW19, author = {Dong Zheng and Chunming Jing and Rui Guo and Shiyao Gao and Liang Wang}, title = {A Traceable Blockchain-Based Access Authentication System With Privacy Preservation in VANETs}, journal = {{IEEE} Access}, volume = {7}, pages = {117716--117726}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2936575}, doi = {10.1109/ACCESS.2019.2936575}, timestamp = {Mon, 23 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/ZhengJGGW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adt/WuZZGZZ19, author = {Axin Wu and Yinghui Zhang and Xiaokun Zheng and Rui Guo and Qinglan Zhao and Dong Zheng}, title = {Efficient and privacy-preserving traceable attribute-based encryption in blockchain}, journal = {Ann. des T{\'{e}}l{\'{e}}communications}, volume = {74}, number = {7-8}, pages = {401--411}, year = {2019}, url = {https://doi.org/10.1007/s12243-018-00699-y}, doi = {10.1007/S12243-018-00699-Y}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adt/WuZZGZZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adt/ZhangWZZ19, author = {Yinghui Zhang and Axin Wu and Tiantian Zhang and Dong Zheng}, title = {Secure and flexible keyword search over encrypted data with outsourced decryption in Internet of things}, journal = {Ann. des T{\'{e}}l{\'{e}}communications}, volume = {74}, number = {7-8}, pages = {413--421}, year = {2019}, url = {https://doi.org/10.1007/s12243-018-0694-8}, doi = {10.1007/S12243-018-0694-8}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adt/ZhangWZZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/LiZZ19, author = {Luyang Li and Dong Zheng and Qinglan Zhao}, title = {Construction of Resilient Boolean and Vectorial Boolean Functions with High Nonlinearity}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {102-A}, number = {10}, pages = {1397--1401}, year = {2019}, url = {https://doi.org/10.1587/transfun.E102.A.1397}, doi = {10.1587/TRANSFUN.E102.A.1397}, timestamp = {Mon, 18 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieicet/LiZZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/ZhaoZQG19, author = {Qinglan Zhao and Dong Zheng and Baodong Qin and Rui Guo}, title = {Constructions of 2-Rotation Symmetric Semi-Bent Functions with Degree Bigger than 2}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {102-A}, number = {11}, pages = {1497--1503}, year = {2019}, url = {https://doi.org/10.1587/transfun.E102.A.1497}, doi = {10.1587/TRANSFUN.E102.A.1497}, timestamp = {Mon, 18 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieicet/ZhaoZQG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijfcs/ZhangYZZGR19, author = {Yinghui Zhang and Menglei Yang and Dong Zheng and Tiantian Zhang and Rui Guo and Fang Ren}, title = {Leakage-Resilient Hierarchical Identity-Based Encryption with Recipient Anonymity}, journal = {Int. J. Found. Comput. Sci.}, volume = {30}, number = {4}, pages = {665--681}, year = {2019}, url = {https://doi.org/10.1142/S0129054119400197}, doi = {10.1142/S0129054119400197}, timestamp = {Wed, 15 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijfcs/ZhangYZZGR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/ZhangSLLZ19, author = {Yinghui Zhang and Jiangang Shu and Ximeng Liu and Jin Li and Dong Zheng}, title = {Comments on "A Large-Scale Concurrent Data Anonymous Batch Verification Scheme for Mobile Healthcare Crowd Sensing"}, journal = {{IEEE} Internet Things J.}, volume = {6}, number = {1}, pages = {1287--1290}, year = {2019}, url = {https://doi.org/10.1109/JIOT.2018.2862381}, doi = {10.1109/JIOT.2018.2862381}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/ZhangSLLZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/QinZZC19, author = {Baodong Qin and Qinglan Zhao and Dong Zheng and Hui Cui}, title = {(Dual) server-aided revocable attribute-based encryption with decryption key exposure resistance}, journal = {Inf. Sci.}, volume = {490}, pages = {74--92}, year = {2019}, url = {https://doi.org/10.1016/j.ins.2019.03.053}, doi = {10.1016/J.INS.2019.03.053}, timestamp = {Fri, 12 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isci/QinZZC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/0002Z0X019, author = {Yinghui Zhang and Tiantian Zhang and Rui Guo and Shengmin Xu and Dong Zheng}, title = {Traceable Dynamic Public Auditing with Identity Privacy Preserving for Cloud Storage}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {13}, number = {11}, pages = {5653--5672}, year = {2019}, url = {https://doi.org/10.3837/tiis.2019.11.021}, doi = {10.3837/TIIS.2019.11.021}, timestamp = {Wed, 15 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/0002Z0X019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jise/RenY019, author = {Fang Ren and Xuefei Yang and Dong Zheng}, title = {A {QC-LDPC} Code Based Digital Signature Algorithm}, journal = {J. Inf. Sci. Eng.}, volume = {35}, number = {5}, pages = {1061--1074}, year = {2019}, url = {https://jise.iis.sinica.edu.tw/JISESearch/pages/View/PaperView.jsf?keyId=170\_2266}, timestamp = {Fri, 17 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jise/RenY019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsjkx/Yang0R19, author = {Xuefei Yang and Dong Zheng and Fang Ren}, title = {{\unicode{19968}}{\unicode{31181}}{\unicode{22522}}{\unicode{20110}}QC-LDPC{\unicode{30721}}{\unicode{30340}}{\unicode{25968}}{\unicode{23383}}{\unicode{31614}}{\unicode{21517}}{\unicode{31639}}{\unicode{27861}} (Digital Signature Algorithm Based on {QC-LDPC} Code)}, journal = {{\unicode{35745}}{\unicode{31639}}{\unicode{26426}}{\unicode{31185}}{\unicode{23398}}}, volume = {46}, number = {6}, pages = {162--167}, year = {2019}, url = {https://doi.org/10.11896/j.issn.1002-137X.2019.06.024}, doi = {10.11896/J.ISSN.1002-137X.2019.06.024}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsjkx/Yang0R19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ZhaoYZQ19, author = {Qinglan Zhao and Shuntong Yang and Dong Zheng and Baodong Qin}, title = {A {QR} Code Secret Hiding Scheme against Contrast Analysis Attack for the Internet of Things}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {8105787:1--8105787:8}, year = {2019}, url = {https://doi.org/10.1155/2019/8105787}, doi = {10.1155/2019/8105787}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ZhaoYZQ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tii/ZhangDZLWC19, author = {Yinghui Zhang and Robert H. Deng and Dong Zheng and Jin Li and Pengfei Wu and Jin Cao}, title = {Efficient and Robust Certificateless Signature for Data Crowdsensing in Cloud-Assisted Industrial IoT}, journal = {{IEEE} Trans. Ind. Informatics}, volume = {15}, number = {9}, pages = {5099--5108}, year = {2019}, url = {https://doi.org/10.1109/TII.2019.2894108}, doi = {10.1109/TII.2019.2894108}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tii/ZhangDZLWC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccchina/LaiDM019, author = {Chengzhe Lai and Yangyang Du and Jiawei Men and Dong Zheng}, title = {A Trust-based Real-time Map Updating Scheme}, booktitle = {2019 {IEEE/CIC} International Conference on Communications in China, {ICCC} 2019, Changchun, China, August 11-13, 2019}, pages = {334--339}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ICCChina.2019.8855894}, doi = {10.1109/ICCCHINA.2019.8855894}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/iccchina/LaiDM019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/GuoSZZ18, author = {Rui Guo and Huixian Shi and Qinglan Zhao and Dong Zheng}, title = {Secure Attribute-Based Signature Scheme With Multiple Authorities for Blockchain in Electronic Health Records Systems}, journal = {{IEEE} Access}, volume = {6}, pages = {11676--11686}, year = {2018}, url = {https://doi.org/10.1109/ACCESS.2018.2801266}, doi = {10.1109/ACCESS.2018.2801266}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/GuoSZZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ZhengWZZ18, author = {Dong Zheng and Axin Wu and Yinghui Zhang and Qinglan Zhao}, title = {Efficient and Privacy-Preserving Medical Data Sharing in Internet of Things With Limited Computing Power}, journal = {{IEEE} Access}, volume = {6}, pages = {28019--28027}, year = {2018}, url = {https://doi.org/10.1109/ACCESS.2018.2840504}, doi = {10.1109/ACCESS.2018.2840504}, timestamp = {Wed, 15 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/ZhengWZZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ZhangDSYZ18, author = {Yinghui Zhang and Robert H. Deng and Jiangang Shu and Kan Yang and Dong Zheng}, title = {{TKSE:} Trustworthy Keyword Search Over Encrypted Data With Two-Side Verifiability via Blockchain}, journal = {{IEEE} Access}, volume = {6}, pages = {31077--31087}, year = {2018}, url = {https://doi.org/10.1109/ACCESS.2018.2844400}, doi = {10.1109/ACCESS.2018.2844400}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/ZhangDSYZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cai/ZhangZGZ18, author = {Yinghui Zhang and Dong Zheng and Rui Guo and Qinglan Zhao}, title = {Fine-Grained Access Control Systems Suitable for Resource-Constrained Users in Cloud Computing}, journal = {Comput. Informatics}, volume = {37}, number = {2}, pages = {327--348}, year = {2018}, url = {https://doi.org/10.4149/cai\_2018\_2\_327}, doi = {10.4149/CAI\_2018\_2\_327}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cai/ZhangZGZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/HanLQZ18, author = {Gang Han and Hui Li and Baodong Qin and Dong Zheng}, title = {Chameleon all-but-one extractable hash proof and its applications}, journal = {Sci. China Inf. Sci.}, volume = {61}, number = {9}, pages = {099103:1--099103:3}, year = {2018}, url = {https://doi.org/10.1007/s11432-017-9369-9}, doi = {10.1007/S11432-017-9369-9}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/chinaf/HanLQZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/QinZZ18, author = {Baodong Qin and Qinglan Zhao and Dong Zheng}, title = {Bounded Revocable and Outsourceable {ABE} for Secure Data Sharing}, journal = {Comput. J.}, volume = {61}, number = {8}, pages = {1259--1268}, year = {2018}, url = {https://doi.org/10.1093/comjnl/bxy063}, doi = {10.1093/COMJNL/BXY063}, timestamp = {Mon, 27 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/QinZZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dam/ZhaoZZ18, author = {Qinglan Zhao and Dong Zheng and Weiguo Zhang}, title = {Constructions of rotation symmetric bent functions with high algebraic degree}, journal = {Discret. Appl. Math.}, volume = {251}, pages = {15--29}, year = {2018}, url = {https://doi.org/10.1016/j.dam.2018.05.048}, doi = {10.1016/J.DAM.2018.05.048}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dam/ZhaoZZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/ZhangZD18, author = {Yinghui Zhang and Dong Zheng and Robert H. Deng}, title = {Security and Privacy in Smart Health: Efficient Policy-Hiding Attribute-Based Access Control}, journal = {{IEEE} Internet Things J.}, volume = {5}, number = {3}, pages = {2130--2145}, year = {2018}, url = {https://doi.org/10.1109/JIOT.2018.2825289}, doi = {10.1109/JIOT.2018.2825289}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/ZhangZD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/ZhangDLZ18, author = {Yinghui Zhang and Robert H. Deng and Ximeng Liu and Dong Zheng}, title = {Blockchain based efficient and robust fair payment for outsourcing services in cloud computing}, journal = {Inf. Sci.}, volume = {462}, pages = {262--277}, year = {2018}, url = {https://doi.org/10.1016/j.ins.2018.06.018}, doi = {10.1016/J.INS.2018.06.018}, timestamp = {Wed, 15 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isci/ZhangDLZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jaihc/ZhangWZ18, author = {Yinghui Zhang and Axin Wu and Dong Zheng}, title = {Efficient and privacy-aware attribute-based data sharing in mobile cloud computing}, journal = {J. Ambient Intell. Humaniz. Comput.}, volume = {9}, number = {4}, pages = {1039--1048}, year = {2018}, url = {https://doi.org/10.1007/s12652-017-0509-1}, doi = {10.1007/S12652-017-0509-1}, timestamp = {Mon, 10 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jaihc/ZhangWZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/ZhangLZLT18, author = {Yinghui Zhang and Jin Li and Dong Zheng and Ping Li and Yangguang Tian}, title = {Privacy-preserving communication and power injection over vehicle networks and 5G smart grid slice}, journal = {J. Netw. Comput. Appl.}, volume = {122}, pages = {50--60}, year = {2018}, url = {https://doi.org/10.1016/j.jnca.2018.07.017}, doi = {10.1016/J.JNCA.2018.07.017}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/ZhangLZLT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/ZhangDHZ18, author = {Yinghui Zhang and Robert H. Deng and Gang Han and Dong Zheng}, title = {Secure smart health with privacy-aware aggregate authentication and access control in Internet of Things}, journal = {J. Netw. Comput. Appl.}, volume = {123}, pages = {89--100}, year = {2018}, url = {https://doi.org/10.1016/j.jnca.2018.09.005}, doi = {10.1016/J.JNCA.2018.09.005}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/ZhangDHZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsjkx/Yan00LS18, author = {Ming Yan and Yinghui Zhang and Dong Zheng and Liudi Lv and Haonan Su}, title = {{\unicode{28789}}{\unicode{27963}}{\unicode{35775}}{\unicode{38382}}{\unicode{19988}}{\unicode{27169}}{\unicode{31946}}{\unicode{21487}}{\unicode{25628}}{\unicode{32034}}{\unicode{30340}}EHR{\unicode{20113}}{\unicode{26381}}{\unicode{21153}}{\unicode{31995}}{\unicode{32479}} (Flexibly Accessed and Vaguely Searchable {EHR} Cloud Service System)}, journal = {{\unicode{35745}}{\unicode{31639}}{\unicode{26426}}{\unicode{31185}}{\unicode{23398}}}, volume = {45}, number = {10}, pages = {172--177}, year = {2018}, url = {https://doi.org/10.11896/j.issn.1002-137X.2018.10.032}, doi = {10.11896/J.ISSN.1002-137X.2018.10.032}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsjkx/Yan00LS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ppna/LaiGLZ18, author = {Chengzhe Lai and Wenlong Guo and Yafei Li and Dong Zheng}, title = {{SEIP:} Secure and seamless {IP} communications for group-oriented machine to machine communications}, journal = {Peer-to-Peer Netw. Appl.}, volume = {11}, number = {5}, pages = {821--836}, year = {2018}, url = {https://doi.org/10.1007/s12083-017-0568-2}, doi = {10.1007/S12083-017-0568-2}, timestamp = {Mon, 04 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ppna/LaiGLZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ZhangLZYG18, author = {Yinghui Zhang and Pengzhen Lang and Dong Zheng and Menglei Yang and Rui Guo}, title = {A Secure and Privacy-Aware Smart Health System with Secret Key Leakage Resilience}, journal = {Secur. Commun. Networks}, volume = {2018}, pages = {7202598:1--7202598:13}, year = {2018}, url = {https://doi.org/10.1155/2018/7202598}, doi = {10.1155/2018/7202598}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ZhangLZYG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ZhangSY0RZ18, author = {Yinghui Zhang and Haonan Su and Menglei Yang and Dong Zheng and Fang Ren and Qinglan Zhao}, title = {Secure Deduplication Based on Rabin Fingerprinting over Wireless Sensing Data in Cloud Computing}, journal = {Secur. Commun. Networks}, volume = {2018}, pages = {9081814:1--9081814:12}, year = {2018}, url = {https://doi.org/10.1155/2018/9081814}, doi = {10.1155/2018/9081814}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ZhangSY0RZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/WuZZY18, author = {Axin Wu and Dong Zheng and Yinghui Zhang and Menglei Yang}, title = {Hidden Policy Attribute-Based Data Sharing with Direct Revocation and Keyword Search in Cloud Computing}, journal = {Sensors}, volume = {18}, number = {7}, pages = {2158}, year = {2018}, url = {https://doi.org/10.3390/s18072158}, doi = {10.3390/S18072158}, timestamp = {Wed, 15 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/WuZZY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/ZhangZ0DRZS18, author = {Yinghui Zhang and Jiangfan Zhao and Dong Zheng and Kaixin Deng and Fangyuan Ren and Xiaokun Zheng and Jiangang Shu}, title = {Privacy-Preserving Data Aggregation against False Data Injection Attacks in Fog Computing}, journal = {Sensors}, volume = {18}, number = {8}, pages = {2659}, year = {2018}, url = {https://doi.org/10.3390/s18082659}, doi = {10.3390/S18082659}, timestamp = {Wed, 15 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/ZhangZ0DRZS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/soco/ZhangYZLWC18, author = {Yinghui Zhang and Menglei Yang and Dong Zheng and Pengzhen Lang and Axin Wu and Chen Chen}, title = {Efficient and secure big data storage system with leakage resilience in cloud computing}, journal = {Soft Comput.}, volume = {22}, number = {23}, pages = {7763--7772}, year = {2018}, url = {https://doi.org/10.1007/s00500-018-3435-z}, doi = {10.1007/S00500-018-3435-Z}, timestamp = {Wed, 15 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/soco/ZhangYZLWC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/vcomm/LaiZZJ18, author = {Chengzhe Lai and Dong Zheng and Qinglan Zhao and Xiaohong Jiang}, title = {{SEGM:} {A} secure group management framework in integrated VANET-cellular networks}, journal = {Veh. Commun.}, volume = {11}, pages = {33--45}, year = {2018}, url = {https://doi.org/10.1016/j.vehcom.2018.01.004}, doi = {10.1016/J.VEHCOM.2018.01.004}, timestamp = {Fri, 20 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/vcomm/LaiZZJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ica3pp/0001DZZZM18, author = {Dong Zheng and Kaixin Deng and Yinghui Zhang and Jiangfan Zhao and Xiaokun Zheng and Xinwei Ma}, editor = {Jaideep Vaidya and Jin Li}, title = {Smart Grid Power Trading Based on Consortium Blockchain in Internet of Things}, booktitle = {Algorithms and Architectures for Parallel Processing - 18th International Conference, {ICA3PP} 2018, Guangzhou, China, November 15-17, 2018, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11336}, pages = {453--459}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-05057-3\_34}, doi = {10.1007/978-3-030-05057-3\_34}, timestamp = {Wed, 15 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ica3pp/0001DZZZM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ica3pp/ZhangZ0DRZ18, author = {Yinghui Zhang and Jiangfan Zhao and Dong Zheng and Kaixin Deng and Fangyuan Ren and Xiaokun Zheng}, editor = {Jaideep Vaidya and Jin Li}, title = {Privacy-Aware Data Collection and Aggregation in IoT Enabled Fog Computing}, booktitle = {Algorithms and Architectures for Parallel Processing - 18th International Conference, {ICA3PP} 2018, Guangzhou, China, November 15-17, 2018, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11337}, pages = {581--590}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-05063-4\_44}, doi = {10.1007/978-3-030-05063-4\_44}, timestamp = {Wed, 15 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ica3pp/ZhangZ0DRZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nana/RenY018, author = {Fang Ren and Xuefei Yang and Dong Zheng}, title = {A {QC-LDPC} Code Based Digital Signature Algorithm}, booktitle = {International Conference on Networking and Network Applications, NaNA 2018, Xi'an, China, October 12-15, 2018}, pages = {257--262}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/NANA.2018.8648750}, doi = {10.1109/NANA.2018.8648750}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/nana/RenY018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/ZhaoZ17a, author = {Qinglan Zhao and Dong Zheng}, title = {Two classes of rotation symmetric semi-bent functions}, journal = {Sci. China Inf. Sci.}, volume = {60}, number = {6}, pages = {068103:1--068103:3}, year = {2017}, url = {https://doi.org/10.1007/s11432-016-9036-y}, doi = {10.1007/S11432-016-9036-Y}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/chinaf/ZhaoZ17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/ZhaoZLZD17, author = {Qinglan Zhao and Dong Zheng and Xiangxue Li and Yinghui Zhang and Xiaoli Dong}, title = {Characterizing Linear Structures of Boolean Functions from Arithmetic Walsh Transform}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {100-A}, number = {9}, pages = {1965--1972}, year = {2017}, url = {https://doi.org/10.1587/transfun.E100.A.1965}, doi = {10.1587/TRANSFUN.E100.A.1965}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/ZhaoZLZD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/RenZW17, author = {Fang Ren and Dong Zheng and WeiJing Wang}, title = {An Efficient Code Based Digital Signature Algorithm}, journal = {Int. J. Netw. Secur.}, volume = {19}, number = {6}, pages = {1072--1079}, year = {2017}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n6/ijns-2017-v19-n6-p1072-1079.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/RenZW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsjkx/Ye0R18, author = {Junyao Ye and Dong Zheng and Fang Ren}, title = {{\unicode{25913}}{\unicode{36827}}{\unicode{30340}}{\unicode{20855}}{\unicode{26377}}{\unicode{36731}}{\unicode{37327}}{\unicode{32423}}{\unicode{32467}}{\unicode{26500}}{\unicode{30340}}Veron{\unicode{36523}}{\unicode{20221}}{\unicode{35748}}{\unicode{35777}}{\unicode{21450}}{\unicode{25968}}{\unicode{23383}}{\unicode{31614}}{\unicode{21517}}{\unicode{26041}}{\unicode{26696}} (Improved Veron's Identification with Lightweight Structure and Digital Signature Scheme)}, journal = {{\unicode{35745}}{\unicode{31639}}{\unicode{26426}}{\unicode{31185}}{\unicode{23398}}}, volume = {44}, number = {3}, pages = {168--174}, year = {2017}, url = {https://doi.org/10.11896/j.issn.1002-137X.2017.03.037}, doi = {10.11896/J.ISSN.1002-137X.2017.03.037}, timestamp = {Fri, 20 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsjkx/Ye0R18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mis/ZhangZZ17, author = {Yinghui Zhang and Jiangfan Zhao and Dong Zheng}, title = {Efficient and Privacy-Aware Power Injection over {AMI} and Smart Grid Slice in Future 5G Networks}, journal = {Mob. Inf. Syst.}, volume = {2017}, pages = {3680671:1--3680671:11}, year = {2017}, url = {https://doi.org/10.1155/2017/3680671}, doi = {10.1155/2017/3680671}, timestamp = {Thu, 01 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mis/ZhangZZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/puc/ZhangLZCL17, author = {Yinghui Zhang and Jin Li and Dong Zheng and Xiaofeng Chen and Hui Li}, title = {Towards privacy protection and malicious behavior traceability in smart health}, journal = {Pers. Ubiquitous Comput.}, volume = {21}, number = {5}, pages = {815--830}, year = {2017}, url = {https://doi.org/10.1007/s00779-017-1047-8}, doi = {10.1007/S00779-017-1047-8}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/puc/ZhangLZCL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/HanYLZZL17, author = {Gang Han and Yu Yu and Xiangxue Li and Qifeng Zhou and Dong Zheng and Hui Li}, title = {1-Resilient Boolean Functions on Even Variables with Almost Perfect Algebraic Immunity}, journal = {Secur. Commun. Networks}, volume = {2017}, pages = {6268230:1--6268230:9}, year = {2017}, url = {https://doi.org/10.1155/2017/6268230}, doi = {10.1155/2017/6268230}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/HanYLZZL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/QinZ0C17, author = {Baodong Qin and Qinglan Zhao and Dong Zheng and Hui Cui}, editor = {Srdjan Capkun and Sherman S. M. Chow}, title = {Server-Aided Revocable Attribute-Based Encryption Resilient to Decryption Key Exposure}, booktitle = {Cryptology and Network Security - 16th International Conference, {CANS} 2017, Hong Kong, China, November 30 - December 2, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11261}, pages = {504--514}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-030-02641-7\_25}, doi = {10.1007/978-3-030-02641-7\_25}, timestamp = {Fri, 12 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cans/QinZ0C17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cse/SuZZ17, author = {Haonan Su and Dong Zheng and Yinghui Zhang}, title = {An Efficient and Secure Deduplication Scheme Based on Rabin Fingerprinting in Cloud Storage}, booktitle = {2017 {IEEE} International Conference on Computational Science and Engineering, {CSE} 2017, and {IEEE} International Conference on Embedded and Ubiquitous Computing, {EUC} 2017, Guangzhou, China, July 21-24, 2017, Volume 1}, pages = {833--836}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/CSE-EUC.2017.166}, doi = {10.1109/CSE-EUC.2017.166}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cse/SuZZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cse/ZhangZ17a, author = {Yinghui Zhang and Dong Zheng}, title = {Anonymous Attribute-Based Encryption with Large Universe and Threshold Access Structures}, booktitle = {2017 {IEEE} International Conference on Computational Science and Engineering, {CSE} 2017, and {IEEE} International Conference on Embedded and Ubiquitous Computing, {EUC} 2017, Guangzhou, China, July 21-24, 2017, Volume 1}, pages = {870--874}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/CSE-EUC.2017.175}, doi = {10.1109/CSE-EUC.2017.175}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cse/ZhangZ17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsc/LiZZSYL17, author = {Runhe Li and Dong Zheng and Yinghui Zhang and Haonan Su and Menglei Yang and Pengzhen Lang}, title = {Attribute-Based Encryption with Multi-keyword Search}, booktitle = {Second {IEEE} International Conference on Data Science in Cyberspace, {DSC} 2017, Shenzhen, China, June 26-29, 2017}, pages = {172--177}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/DSC.2017.97}, doi = {10.1109/DSC.2017.97}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsc/LiZZSYL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/GuoLZ17, author = {Rui Guo and Xiong Li and Dong Zheng}, editor = {Xingming Sun and Han{-}Chieh Chao and Xingang You and Elisa Bertino}, title = {Privacy-Preserving Medical Information Systems Using Multi-authority Content-Based Encryption in Cloud}, booktitle = {Cloud Computing and Security - Third International Conference, {ICCCS} 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10603}, pages = {268--279}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68542-7\_22}, doi = {10.1007/978-3-319-68542-7\_22}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/GuoLZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nana/ZhangZZLR17, author = {Yinghui Zhang and Dong Zheng and Qinglan Zhao and Chengzhe Lai and Fang Ren}, title = {{PADA:} Privacy-Aware Data Aggregation with Efficient Communication for Power Injection in 5G Smart Grid Slice}, booktitle = {International Conference on Networking and Network Applications, NaNA 2017, Kathmandu City, Nepal, October 16-19, 2017}, pages = {11--16}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/NaNA.2017.26}, doi = {10.1109/NANA.2017.26}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nana/ZhangZZLR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wasa/LaiLZ17, author = {Chengzhe Lai and Rongxing Lu and Dong Zheng}, editor = {Liran Ma and Abdallah Khreishah and Yan Zhang and Mingyuan Yan}, title = {Achieving Secure and Seamless {IP} Communications for Group-Oriented Software Defined Vehicular Networks}, booktitle = {Wireless Algorithms, Systems, and Applications - 12th International Conference, {WASA} 2017, Guilin, China, June 19-21, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10251}, pages = {356--368}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-60033-8\_32}, doi = {10.1007/978-3-319-60033-8\_32}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/wasa/LaiLZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/LaiLZLS16, author = {Chengzhe Lai and Rongxing Lu and Dong Zheng and Hui Li and Xuemin (Sherman) Shen}, title = {{GLARM:} Group-based lightweight authentication scheme for resource-constrained machine to machine communications}, journal = {Comput. Networks}, volume = {99}, pages = {66--81}, year = {2016}, url = {https://doi.org/10.1016/j.comnet.2016.02.007}, doi = {10.1016/J.COMNET.2016.02.007}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/LaiLZLS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/percom/ZhangZ0LL16, author = {Yinghui Zhang and Dong Zheng and Xiaofeng Chen and Jin Li and Hui Li}, title = {Efficient attribute-based data sharing in mobile clouds}, journal = {Pervasive Mob. Comput.}, volume = {28}, pages = {135--149}, year = {2016}, url = {https://doi.org/10.1016/j.pmcj.2015.06.009}, doi = {10.1016/J.PMCJ.2015.06.009}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/percom/ZhangZ0LL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ZhangZLLL16, author = {Yinghui Zhang and Dong Zheng and Qi Li and Jin Li and Hui Li}, title = {Online/offline unbounded multi-authority attribute-based encryption for data sharing in mobile cloud computing}, journal = {Secur. Commun. Networks}, volume = {9}, number = {16}, pages = {3688--3702}, year = {2016}, url = {https://doi.org/10.1002/sec.1574}, doi = {10.1002/SEC.1574}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ZhangZLLL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LaiLZ16, author = {Chengzhe Lai and Rongxing Lu and Dong Zheng}, title = {{SPGS:} a secure and privacy-preserving group setup framework for platoon-based vehicular cyber-physical systems}, journal = {Secur. Commun. Networks}, volume = {9}, number = {16}, pages = {3854--3867}, year = {2016}, url = {https://doi.org/10.1002/sec.1523}, doi = {10.1002/SEC.1523}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/LaiLZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wicomm/LaiLLZS16, author = {Chengzhe Lai and Rongxing Lu and Hui Li and Dong Zheng and Xuemin (Sherman) Shen}, title = {Secure machine-type communications in {LTE} networks}, journal = {Wirel. Commun. Mob. Comput.}, volume = {16}, number = {12}, pages = {1495--1509}, year = {2016}, url = {https://doi.org/10.1002/wcm.2612}, doi = {10.1002/WCM.2612}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/wicomm/LaiLLZS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ZhangLZ0016, author = {Yinghui Zhang and Jin Li and Dong Zheng and Xiaofeng Chen and Hui Li}, editor = {Joseph K. Liu and Ron Steinfeld}, title = {Accountable Large-Universe Attribute-Based Encryption Supporting Any Monotone Access Structures}, booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9722}, pages = {509--524}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40253-6\_31}, doi = {10.1007/978-3-319-40253-6\_31}, timestamp = {Wed, 15 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/ZhangLZ0016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bwcca/LiuZZ16, author = {Hang Liu and Dong Zheng and Qinglan Zhao}, editor = {Leonard Barolli and Fatos Xhafa and Kangbin Yim}, title = {Construction of Boolean Functions with Optimal Algebraic Immunity}, booktitle = {Advances on Broad-Band Wireless Computing, Communication and Applications, Proceedings of the 11th International Conference On Broad-Band Wireless Computing, Communication and Applications, {BWCCA} 2016, Soonchunhyang University, Asan, Korea, November 5-7, 2016}, series = {Lecture Notes on Data Engineering and Communications Technologies}, volume = {2}, pages = {791--798}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-49106-6\_80}, doi = {10.1007/978-3-319-49106-6\_80}, timestamp = {Fri, 17 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/bwcca/LiuZZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bwcca/ZhangZ16, author = {Yinghui Zhang and Dong Zheng}, editor = {Leonard Barolli and Fatos Xhafa and Kangbin Yim}, title = {Efficient and Expressive Anonymous Attribute-Based Encryption for Mobile Cloud Computing}, booktitle = {Advances on Broad-Band Wireless Computing, Communication and Applications, Proceedings of the 11th International Conference On Broad-Band Wireless Computing, Communication and Applications, {BWCCA} 2016, Soonchunhyang University, Asan, Korea, November 5-7, 2016}, series = {Lecture Notes on Data Engineering and Communications Technologies}, volume = {2}, pages = {807--814}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-49106-6\_82}, doi = {10.1007/978-3-319-49106-6\_82}, timestamp = {Wed, 15 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/bwcca/ZhangZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cm/LaiLZ0S15, author = {Chengzhe Lai and Rongxing Lu and Dong Zheng and Hui Li and Xuemin (Sherman) Shen}, title = {Toward secure large-scale machine-to-machine comm unications in 3GPP networks: chall enges and solutions}, journal = {{IEEE} Commun. Mag.}, volume = {53}, number = {12}, pages = {12--19}, year = {2015}, url = {https://doi.org/10.1109/MCOM.2015.7355579}, doi = {10.1109/MCOM.2015.7355579}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cm/LaiLZ0S15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsjkx/Ren015, author = {Fang Ren and Dong Zheng}, title = {{\unicode{28145}}{\unicode{31354}}{\unicode{32593}}{\unicode{32476}}{\unicode{30340}}{\unicode{39640}}{\unicode{25928}}{\unicode{23433}}{\unicode{20840}}{\unicode{36890}}{\unicode{20449}}{\unicode{26426}}{\unicode{21046}} (Efficient and Secure Communication Scheme for Deep Space Networks)}, journal = {{\unicode{35745}}{\unicode{31639}}{\unicode{26426}}{\unicode{31185}}{\unicode{23398}}}, volume = {42}, number = {12}, pages = {229--232}, year = {2015}, url = {http://www.jsjkx.com/CN/Y2015/V42/I12/229}, doi = {Y2015/V42/I12/229}, timestamp = {Mon, 27 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsjkx/Ren015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wasa/LaiLZ15, author = {Chengzhe Lai and Rongxing Lu and Dong Zheng}, editor = {Kuai Xu and Haojin Zhu}, title = {{SGSA:} Secure Group Setup and Anonymous Authentication in Platoon-Based Vehicular Cyber-Physical Systems}, booktitle = {Wireless Algorithms, Systems, and Applications - 10th International Conference, {WASA} 2015, Qufu, China, August 10-12, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9204}, pages = {274--283}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-21837-3\_27}, doi = {10.1007/978-3-319-21837-3\_27}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/wasa/LaiLZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/LiZQZC14, author = {Xiangxue Li and Qingji Zheng and Haifeng Qian and Dong Zheng and Kefei Chen}, title = {{PWG:} Progressive Weight-Growth Algorithm for {LDPC} Codes}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {97-A}, number = {2}, pages = {685--689}, year = {2014}, url = {https://doi.org/10.1587/transfun.E97.A.685}, doi = {10.1587/TRANSFUN.E97.A.685}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/LiZQZC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icinfa/WangH0L14, author = {Jiantao Wang and Zheng Huang and Dong Zheng and Qiang Li}, title = {An application of newton formula on the computation of finite field trace}, booktitle = {{IEEE} International Conference on Information and Automation, {ICIA} 2014, Hailar, Hulun Buir, China, July 28-30, 2014}, pages = {137--140}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICInfA.2014.6932641}, doi = {10.1109/ICINFA.2014.6932641}, timestamp = {Mon, 09 Aug 2021 14:54:01 +0200}, biburl = {https://dblp.org/rec/conf/icinfa/WangH0L14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/ZhangZCLL14, author = {Yinghui Zhang and Dong Zheng and Xiaofeng Chen and Jin Li and Hui Li}, editor = {Sherman S. M. Chow and Joseph K. Liu and Lucas Chi Kwong Hui and Siu{-}Ming Yiu}, title = {Computationally Efficient Ciphertext-Policy Attribute-Based Encryption with Constant-Size Ciphertexts}, booktitle = {Provable Security - 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8782}, pages = {259--273}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12475-9\_18}, doi = {10.1007/978-3-319-12475-9\_18}, timestamp = {Wed, 15 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/provsec/ZhangZCLL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiLZC12, author = {Qiang Li and Xiangxue Li and Dong Zheng and Kefei Chen}, title = {Optimal Multiple Assignments with (m, m)-Scheme for General Access Structures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {7}, year = {2012}, url = {http://eprint.iacr.org/2012/007}, timestamp = {Thu, 16 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiLZC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiLZHC12, author = {Qiang Li and Xiangxue Li and Dong Zheng and Zheng Huang and Kefei Chen}, title = {On the Equivalence between the Set Covering Problem and the Problem of Finding Optimal Cumulative Assignment Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {245}, year = {2012}, url = {http://eprint.iacr.org/2012/245}, timestamp = {Thu, 16 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiLZHC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/LiuGQZ11, author = {Bozhong Liu and Zheng Gong and Weidong Qiu and Dong Zheng}, editor = {Feng Bao and Jian Weng}, title = {On the Security of 4-Bit Involutive S-Boxes for Lightweight Designs}, booktitle = {Information Security Practice and Experience - 7th International Conference, {ISPEC} 2011, Guangzhou, China, May 30 - June 1, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6672}, pages = {247--256}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21031-0\_19}, doi = {10.1007/978-3-642-21031-0\_19}, timestamp = {Tue, 12 May 2020 10:56:38 +0200}, biburl = {https://dblp.org/rec/conf/ispec/LiuGQZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sose/HuangLZCL11, author = {Zheng Huang and Qiang Li and Dong Zheng and Kefei Chen and Xiangxue Li}, editor = {Jerry Zeyu Gao and Xiaodong Lu and Muhammad Younas and Hong Zhu}, title = {{YI} Cloud: Improving user privacy with secret key recovery in cloud storage}, booktitle = {{IEEE} 6th International Symposium on Service Oriented System Engineering, {SOSE} 2011, Irvine, CA, USA, December 12-14, 2011}, pages = {268--272}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/SOSE.2011.6139116}, doi = {10.1109/SOSE.2011.6139116}, timestamp = {Wed, 21 Jun 2023 16:54:56 +0200}, biburl = {https://dblp.org/rec/conf/sose/HuangLZCL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tie/LiQZCL10, author = {Xiangxue Li and Weidong Qiu and Dong Zheng and Kefei Chen and Jianhua Li}, title = {Anonymity Enhancement on Robust and Efficient Password-Authenticated Key Agreement Using Smart Cards}, journal = {{IEEE} Trans. Ind. Electron.}, volume = {57}, number = {2}, pages = {793--800}, year = {2010}, url = {https://doi.org/10.1109/TIE.2009.2028351}, doi = {10.1109/TIE.2009.2028351}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tie/LiQZCL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iih-msp/ZhengLZG10, author = {Qingji Zheng and Xiangxue Li and Dong Zheng and Baoan Guo}, editor = {Isao Echizen and Jeng{-}Shyang Pan and Dieter W. Fellner and Alexander Nouak and Arjan Kuijper and Lakhmi C. Jain}, title = {Regular Quasi-cyclic {LDPC} Codes with Girth 6 from Prime Fields}, booktitle = {Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing {(IIH-MSP} 2010), Darmstadt, Germany, 15-17 October, 2010, Proceedings}, pages = {470--473}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IIHMSP.2010.120}, doi = {10.1109/IIHMSP.2010.120}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iih-msp/ZhengLZG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/LiZCL09, author = {Xiangxue Li and Dong Zheng and Kefei Chen and Jianhua Li}, title = {Democratic group signatures with collective traceability}, journal = {Comput. Electr. Eng.}, volume = {35}, number = {5}, pages = {664--672}, year = {2009}, url = {https://doi.org/10.1016/j.compeleceng.2009.01.005}, doi = {10.1016/J.COMPELECENG.2009.01.005}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cee/LiZCL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/icl/LiZQZL09, author = {Xiangxue Li and Qingji Zheng and Haifeng Qian and Dong Zheng and Jianhua Li}, title = {Toward optimizing cauchy matrix for cauchy reed-solomon code}, journal = {{IEEE} Commun. Lett.}, volume = {13}, number = {8}, pages = {603--605}, year = {2009}, url = {https://doi.org/10.1109/LCOMM.2009.090988}, doi = {10.1109/LCOMM.2009.090988}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/icl/LiZQZL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jise/HanCZ09, author = {Wei Han and Kefei Chen and Dong Zheng}, title = {Receipt-Freeness for Groth e-Voting Schemes}, journal = {J. Inf. Sci. Eng.}, volume = {25}, number = {2}, pages = {517--530}, year = {2009}, url = {http://www.iis.sinica.edu.tw/page/jise/2009/200903\_11.html}, timestamp = {Fri, 16 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jise/HanCZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispa/ZhouLZCL09, author = {Zhiheng Zhou and Xiangxue Li and Dong Zheng and Kefei Chen and Jianhua Li}, title = {Extended {PEG} Algorithm for High Rate {LDPC} Codes}, booktitle = {{IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA} 2009, Chengdu, Sichuan, China, 10-12 August 2009}, pages = {494--498}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ISPA.2009.80}, doi = {10.1109/ISPA.2009.80}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ispa/ZhouLZCL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ncm/GuoLZLL09, author = {Chaonian Guo and Xiangxue Li and Dong Zheng and Shengli Liu and Jianhua Li}, editor = {Jinhwa Kim and Dursun Delen and Jinsoo Park and Franz Ko and Chen Rui and Jong Hyung Lee and Jian Wang and Gang Kou}, title = {{AE-BP:} Adaptive Erasure Belief Propagation Decoding Algorithm of {LDPC} Codes}, booktitle = {International Conference on Networked Computing and Advanced Information Management, {NCM} 2009, Fifth International Joint Conference on INC, {IMS} and {IDC:} {INC} 2009: International Conference on Networked Computing, {IMS} 2009: International Conference on Advanced Information Management and Service, {IDC} 2009: International Conference on Digital Content, Multimedia Technology and its Applications, Seoul, Korea, August 25-27, 2009}, pages = {479--483}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/NCM.2009.15}, doi = {10.1109/NCM.2009.15}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ncm/GuoLZLL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jise/GongLZC08, author = {Zheng Gong and Xiangxue Li and Dong Zheng and Kefei Chen}, title = {A Generic Construction for Instrusion-Resilient Signatures from Linear Feedback Shift Register}, journal = {J. Inf. Sci. Eng.}, volume = {24}, number = {5}, pages = {1347--1360}, year = {2008}, url = {http://www.iis.sinica.edu.tw/page/jise/2008/200809\_04.html}, timestamp = {Fri, 16 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jise/GongLZC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/WengLCZQ08, author = {Jian Weng and Shengli Liu and Kefei Chen and Dong Zheng and Weidong Qiu}, editor = {Tal Malkin}, title = {Identity-Based Threshold Key-Insulated Encryption without Random Oracles}, booktitle = {Topics in Cryptology - {CT-RSA} 2008, The Cryptographers' Track at the {RSA} Conference 2008, San Francisco, CA, USA, April 8-11, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4964}, pages = {203--220}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-79263-5\_13}, doi = {10.1007/978-3-540-79263-5\_13}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ctrsa/WengLCZQ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/HanHZCC08, author = {Wei Han and Tao Hao and Dong Zheng and Kefei Chen and Xiaofeng Chen}, editor = {Joonsang Baek and Feng Bao and Kefei Chen and Xuejia Lai}, title = {A Tamper-Evident Voting Machine Resistant to Covert Channels}, booktitle = {Provable Security, Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5324}, pages = {335--344}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88733-1\_24}, doi = {10.1007/978-3-540-88733-1\_24}, timestamp = {Tue, 14 May 2019 10:00:45 +0200}, biburl = {https://dblp.org/rec/conf/provsec/HanHZCC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhengLMCL08, author = {Dong Zheng and Xiangxue Li and Changshe Ma and Kefei Chen and Jianhua Li}, title = {Democratic Group Signatures with Threshold Traceability}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {112}, year = {2008}, url = {http://eprint.iacr.org/2008/112}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhengLMCL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/LiZC07, author = {Xiangxue Li and Dong Zheng and Kefei Chen}, title = {LFSR-based Signatures with Message Recovery}, journal = {Int. J. Netw. Secur.}, volume = {4}, number = {3}, pages = {266--270}, year = {2007}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v4-n3/ijns-2007-v4-n3-p266-270.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/LiZC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/ZhengLC07, author = {Dong Zheng and Xiangxue Li and Kefei Chen}, title = {Code-based Ring Signature Scheme}, journal = {Int. J. Netw. Secur.}, volume = {5}, number = {2}, pages = {154--157}, year = {2007}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v5-n2/ijns-2007-v5-n2-p154-157.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/ZhengLC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cdve/LiZC07, author = {Xiangxue Li and Dong Zheng and Kefei Chen}, editor = {Yuhua Luo}, title = {Efficient Blind Signatures from Linear Feedback Shift Register}, booktitle = {Cooperative Design, Visualization, and Engineering, 4th International Conference, {CDVE} 2007, Shanghai, China, September 16-20, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4674}, pages = {423--425}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74780-2\_57}, doi = {10.1007/978-3-540-74780-2\_57}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/cdve/LiZC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/euc/ZhengLCL07, author = {Dong Zheng and Xiangxue Li and Kefei Chen and Jianhua Li}, editor = {Mieso K. Denko and Chi{-}Sheng Shih and Kuan{-}Ching Li and Shiao{-}Li Tsao and Qing{-}An Zeng and Soo{-}Hyun Park and Young{-}Bae Ko and Shih{-}Hao Hung and Jong Hyuk Park}, title = {Linkable Ring Signatures from Linear Feedback Shift Register}, booktitle = {Emerging Directions in Embedded and Ubiquitous Computing, {EUC} 2007 Workshops: TRUST, WSOC, NCUS, UUWSN, USN, ESO, and SECUBIQ, Taipei, Taiwan, December 17-20, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4809}, pages = {716--727}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77090-9\_66}, doi = {10.1007/978-3-540-77090-9\_66}, timestamp = {Wed, 22 Jun 2022 09:02:26 +0200}, biburl = {https://dblp.org/rec/conf/euc/ZhengLCL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ica3pp/LiZC07, author = {Xiangxue Li and Dong Zheng and Kefei Chen}, editor = {Hai Jin and Omer F. Rana and Yi Pan and Viktor K. Prasanna}, title = {Efficient Linkable Ring Signatures and Threshold Signatures from Linear Feedback Shift Register}, booktitle = {Algorithms and Architectures for Parallel Processing, 7th International Conference, {ICA3PP} 2007, Hangzhou, China, June 11-14, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4494}, pages = {95--106}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72905-1\_9}, doi = {10.1007/978-3-540-72905-1\_9}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/ica3pp/LiZC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sitis/WeiZC07, author = {Han Wei and Dong Zheng and Kefei Chen}, editor = {Kokou Y{\'{e}}tongnon and Richard Chbeir and Albert Dipanda}, title = {A Receipt-Free Punch-Hole Ballot Electronic Voting Scheme}, booktitle = {Third International {IEEE} Conference on Signal-Image Technologies and Internet-Based System, {SITIS} 2007, Shanghai, China, December 16-18, 2007}, pages = {355--360}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/SITIS.2007.15}, doi = {10.1109/SITIS.2007.15}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sitis/WeiZC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MaWZ07, author = {Changshe Ma and Jian Weng and Dong Zheng}, title = {Fast Digital Signature Schemes as Secure as Diffie-Hellman Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {19}, year = {2007}, url = {http://eprint.iacr.org/2007/019}, timestamp = {Wed, 13 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MaWZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HanZC07, author = {Wei Han and Dong Zheng and Kefei Chen}, title = {Filling the Gap between Voters and Cryptography in e-Voting}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {266}, year = {2007}, url = {http://eprint.iacr.org/2007/266}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HanZC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HanZC06, author = {Wei Han and Dong Zheng and Kefei Chen}, title = {Some Remarks on the {TKIP} Key Mixing Function of {IEEE} 802.11i}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {129}, year = {2006}, url = {http://eprint.iacr.org/2006/129}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HanZC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ciarp/LiuZZC05, author = {Yongguo Liu and Wei Zhang and Dong Zheng and Kefei Chen}, editor = {Alberto Sanfeliu and Manuel Lazo{-}Cort{\'{e}}s}, title = {A Novel Clustering Technique Based on Improved Noising Method}, booktitle = {Progress in Pattern Recognition, Image Analysis and Applications, 10th Iberoamerican Congress on Pattern Recognition, {CIARP} 2005, Havana, Cuba, November 15-18, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3773}, pages = {81--92}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11578079\_9}, doi = {10.1007/11578079\_9}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/ciarp/LiuZZC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dis/LiuZLWC05, author = {Yongguo Liu and Dong Zheng and Shiqun Li and Libin Wang and Kefei Chen}, editor = {Achim G. Hoffmann and Hiroshi Motoda and Tobias Scheffer}, title = {A Tabu Clustering Method with {DHB} Operation and Mergence and Partition Operation}, booktitle = {Discovery Science, 8th International Conference, {DS} 2005, Singapore, October 8-11, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3735}, pages = {380--382}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11563983\_36}, doi = {10.1007/11563983\_36}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/dis/LiuZLWC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icpads/ZhangWDC05, author = {Longjun Zhang and Han Wei and Dong Zheng and Kefei Chen}, title = {A Security Solution of {WLAN} Based on Public Key Cryptosystem}, booktitle = {11th International Conference on Parallel and Distributed Systems, {ICPADS} 2005, Fuduoka, Japan, July 20-22, 2005}, pages = {422--427}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/ICPADS.2005.46}, doi = {10.1109/ICPADS.2005.46}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icpads/ZhangWDC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/MaCZL05, author = {Changshe Ma and Kefei Chen and Dong Zheng and Shengli Liu}, editor = {Jianying Zhou and Javier L{\'{o}}pez and Robert H. Deng and Feng Bao}, title = {Efficient and Proactive Threshold Signcryption}, booktitle = {Information Security, 8th International Conference, {ISC} 2005, Singapore, September 20-23, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3650}, pages = {233--243}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11556992\_17}, doi = {10.1007/11556992\_17}, timestamp = {Fri, 17 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/MaCZL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sis/MaCLZ05, author = {Changshe Ma and Kefei Chen and Shengli Liu and Dong Zheng}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Luis Javier Garc{\'{\i}}a Castro}, title = {Transitive Signatures Based on Bilinear Maps}, booktitle = {Security in Information Systems, Proceedings of the 3rd International Workshop on Security in Information Systems, {WOSIS} 2005, In conjunction with ICEIS2005, Miami, USA, May 2005}, pages = {48--56}, publisher = {{INSTICC} Press}, year = {2005}, timestamp = {Fri, 17 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sis/MaCLZ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/DongZCK04, author = {Dong Zheng and Huang Zheng and Kefei Chen and Weidong Kou}, title = {ID-Based Proxy Blind Signature}, booktitle = {18th International Conference on Advanced Information Networking and Applications {(AINA} 2004), 29-31 March 2004, Fukuoka, Japan}, pages = {380--383}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/AINA.2004.1283827}, doi = {10.1109/AINA.2004.1283827}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aina/DongZCK04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YangWZC04, author = {Lizhen Yang and Xiaoyun Wang and Dong Zheng and Kefei Chen}, title = {Yet another attack on a password authentication scheme based on quadratic residues with parameters unknown 1}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {50}, year = {2004}, url = {http://eprint.iacr.org/2004/050}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/YangWZC04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcst/DongCY02, author = {Dong Zheng and Kefei Chen and Jinyuan You}, title = {Multiparty Authentication Services and Key Agreement Protocols with Semi-Trusted Third Party}, journal = {J. Comput. Sci. Technol.}, volume = {17}, number = {6}, pages = {749--756}, year = {2002}, url = {https://doi.org/10.1007/BF02960765}, doi = {10.1007/BF02960765}, timestamp = {Wed, 08 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcst/DongCY02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.