| Publication | Date of Publication | Type |
|---|
| An efficient privacy-preserving scheme for weak password collection in Internet of Things | 2024-07-19 | Paper |
PFLM: privacy-preserving federated learning with membership proof Information Sciences | 2023-12-12 | Paper |
A Novel Nonlinear Control for Uncertain Polynomial Type-2 Fuzzy Systems (Case Study: Cart-Pole System) International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems | 2023-01-30 | Paper |
Certificateless identity-concealed authenticated encryption under multi-KGC Information Security and Cryptology | 2022-10-14 | Paper |
| Blockchain-based efficient public integrity auditing for cloud storage against malicious auditors | 2021-12-08 | Paper |
| Blockchain-based secure data provenance for cloud storage | 2021-01-18 | Paper |
Lattice-based proxy-oriented identity-based encryption with keyword search for cloud storage Information Sciences | 2020-12-10 | Paper |
Identity-based key-exposure resilient cloud storage public auditing scheme from lattices Information Sciences | 2020-09-22 | Paper |
Trace representation of Legendre sequences over non-binary fields Journal of Applied Mathematics and Computing | 2019-08-09 | Paper |
New forward-secure signature schemes with untrusted update Frontiers of Computer Science | 2019-05-28 | Paper |
Threshold public key encryption scheme resilient against continual leakage without random oracles Frontiers of Computer Science | 2019-05-28 | Paper |
On error linear complexity of new generalized cyclotomic binary sequences of period \(p^2\) Information Processing Letters | 2019-02-13 | Paper |
A novel model for lattice-based authorized searchable encryption with special keyword Mathematical Problems in Engineering | 2018-08-27 | Paper |
| Further improvement of a dynamic type and identity-based proxy re-encryption scheme | 2017-07-14 | Paper |
| A secure computation scheme of inner product based on fully homomorphic encryption | 2017-05-17 | Paper |
Scalable group key exchange protocol with provable security COMPEL: The International Journal for Computation and Mathematics in Electrical and Electronic Engineering | 2017-03-30 | Paper |
Cloud data auditing with designated verifier Frontiers of Computer Science | 2015-11-20 | Paper |
A new model for model checking: cycle-weighted Kripke structure Frontiers of Computer Science in China | 2013-07-04 | Paper |
Designated verifier proxy signature scheme without random oracles Computers & Mathematics with Applications | 2010-05-16 | Paper |
Stochastic Modeling and Quality Evaluation of Workflow Systems Based on QWF-Nets Computational Science – ICCS 2006 | 2009-01-13 | Paper |
Dynamic vector space secret sharing based on certificates Wuhan University Journal of Natural Sciences | 2007-06-08 | Paper |
A group oriented cryptosystem for the vector space access structure Journal of Shanghai Jiaotong University (Science) | 2006-11-15 | Paper |
| scientific article; zbMATH DE number 2222191 (Why is no real title available?) | 2005-11-02 | Paper |