| Publication | Date of Publication | Type |
|---|
| Predicate private set intersection with linear complexity | 2023-11-10 | Paper |
A New Functional Encryption for Multidimensional Range Query (Short Paper) Information Security Practice and Experience | 2022-12-09 | Paper |
| Lightweight delegatable proofs of storage | 2022-08-19 | Paper |
| Layering quantum-resistance into classical digital signature algorithms | 2022-07-13 | Paper |
| A modular hybrid learning approach for black-box security testing of CPS | 2020-01-30 | Paper |
| On the efficiency of multi-party contract signing protocols | 2018-10-18 | Paper |
Cost-Effective Authentic and Anonymous Data Sharing with Forward Security IEEE Transactions on Computers | 2017-05-16 | Paper |
<inline-formula><tex-math>$k$</tex-math><alternatives> <inline-graphic xlink:type="simple" xlink:href="huang-ieq1-2366741.gif"/></alternatives></inline-formula>-Times Attribute-Based Anonymous Access Control for Cloud Computing IEEE Transactions on Computers | 2017-05-16 | Paper |
| Accelerated Stochastic ADMM with Variance Reduction | 2016-11-12 | Paper |
Privacy-preserving \(k\)-nearest neighbour query on outsourced database Information Security and Privacy | 2016-08-31 | Paper |
PPDCP-ABE: Privacy-Preserving Decentralized Ciphertext-Policy Attribute-Based Encryption Computer Security - ESORICS 2014 | 2015-07-27 | Paper |
Leakage Resilient Proofs of Ownership in Cloud Storage, Revisited Applied Cryptography and Network Security | 2014-07-07 | Paper |
Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts Theoretical Computer Science | 2014-06-06 | Paper |
How to achieve non-repudiation of origin with privacy protection in cloud computing Journal of Computer and System Sciences | 2014-01-27 | Paper |
Dynamic Secure Cloud Storage with Provenance Cryptography and Security: From Theory to Applications | 2012-06-08 | Paper |
| Hierarchical Dirichlet processes and their applications: a survey | 2012-01-27 | Paper |
| Achieving fairness in non-repudiation protocols | 2011-12-01 | Paper |
Online/offline identity-based signcryption revisited Information Security and Cryptology | 2011-07-29 | Paper |
Identity-based server-aided decryption Information Security and Privacy | 2011-07-07 | Paper |
| scientific article; zbMATH DE number 5901648 (Why is no real title available?) | 2011-05-31 | Paper |
On shortening ciphertexts: new constructions for compact public key and stateful encryption schemes Topics in Cryptology – CT-RSA 2011 | 2011-02-11 | Paper |
Optionally identifiable private handshakes Information Security and Cryptology | 2010-11-23 | Paper |
Validating digital signatures without TTP's time-stamping and certificate revocation Lecture Notes in Computer Science | 2010-02-09 | Paper |
Self-enforcing private inference control Provable Security | 2009-12-11 | Paper |
Conditional Proxy Broadcast Re-Encryption Information Security and Privacy | 2009-06-25 | Paper |
Fuzzy Identity-based Encryption: New and Efficient Schemes Coding and Cryptology | 2009-03-09 | Paper |
Certificate-Based Signature Schemes without Pairings or Random Oracles Lecture Notes in Computer Science | 2008-11-20 | Paper |
Efficient Certificate-Based Encryption in the Standard Model Lecture Notes in Computer Science | 2008-11-20 | Paper |
Constructing Strong KEM from Weak KEM (or How to Revive the KEM/DEM Framework) Lecture Notes in Computer Science | 2008-11-20 | Paper |
A New Formal Proof Model for RFID Location Privacy Computer Security - ESORICS 2008 | 2008-10-27 | Paper |
Generic Constructions of Stateful Public Key Encryption and Their Applications Applied Cryptography and Network Security | 2008-06-13 | Paper |
Cryptanalysis of Barni et al. Watermarking Scheme Progress in Cryptology - INDOCRYPT 2005 | 2008-03-17 | Paper |
Attacking an Asynchronous Multi-party Contract Signing Protocol Progress in Cryptology - INDOCRYPT 2005 | 2008-03-17 | Paper |
Model Generalization and Its Implications on Intrusion Detection Applied Cryptography and Network Security | 2007-09-24 | Paper |
Trust based pervasive computing Wuhan University Journal of Natural Sciences | 2007-06-01 | Paper |
Producing negative permittivity via quantum coherence and local field effect in dense media Journal of Modern Optics | 2007-03-23 | Paper |
Routing optimization security in mobile IPv6 Computer Networks | 2007-03-15 | Paper |
Information and Communications Security Lecture Notes in Computer Science | 2006-10-24 | Paper |
Information and Communications Security Lecture Notes in Computer Science | 2006-10-24 | Paper |
Information Security and Cryptology - ICISC 2003 Lecture Notes in Computer Science | 2005-12-27 | Paper |
Progress in Cryptology - INDOCRYPT 2004 Lecture Notes in Computer Science | 2005-12-22 | Paper |
Information Security and Privacy Lecture Notes in Computer Science | 2005-09-07 | Paper |
Information and Communications Security Lecture Notes in Computer Science | 2005-08-19 | Paper |
| scientific article; zbMATH DE number 2080691 (Why is no real title available?) | 2004-08-04 | Paper |
| scientific article; zbMATH DE number 2030131 (Why is no real title available?) | 2004-03-18 | Paper |
| scientific article; zbMATH DE number 1950351 (Why is no real title available?) | 2003-07-17 | Paper |
| scientific article; zbMATH DE number 1759321 (Why is no real title available?) | 2003-03-24 | Paper |
| scientific article; zbMATH DE number 1440048 (Why is no real title available?) | 2001-08-21 | Paper |
| scientific article; zbMATH DE number 1303976 (Why is no real title available?) | 1999-11-02 | Paper |
| scientific article; zbMATH DE number 1341885 (Why is no real title available?) | 1999-09-22 | Paper |
| scientific article; zbMATH DE number 1304004 (Why is no real title available?) | 1999-06-17 | Paper |
| scientific article; zbMATH DE number 465433 (Why is no real title available?) | 1994-05-15 | Paper |
Structural instability of the mapping z\(\to \lambda \,\exp (z)(\lambda >e^{-1})\) Science in China. Series A | 1989-01-01 | Paper |
| scientific article; zbMATH DE number 4038260 (Why is no real title available?) | 1987-01-01 | Paper |
| scientific article; zbMATH DE number 3960608 (Why is no real title available?) | 1986-01-01 | Paper |
| scientific article; zbMATH DE number 3965043 (Why is no real title available?) | 1985-01-01 | Paper |
| scientific article; zbMATH DE number 3980083 (Why is no real title available?) | 1985-01-01 | Paper |
| scientific article; zbMATH DE number 3774048 (Why is no real title available?) | 1982-01-01 | Paper |