| Publication | Date of Publication | Type |
|---|
Two classes of 1-resilient semi-bent functions based on disjoint linear codes Discrete Applied Mathematics | 2024-09-26 | Paper |
Further construction of even-variable balanced rotation symmetric Boolean functions with optimal algebraic immunity Theoretical Computer Science | 2024-08-27 | Paper |
| DP-Loc: a differential privacy-based indoor localization scheme with bilateral privacy protection | 2024-07-19 | Paper |
Server-aided revocable attribute-based encryption resilient to decryption key exposure Cryptology and Network Security | 2023-08-02 | Paper |
| Improved security model for public-key authenticated encryption with keyword search | 2023-04-13 | Paper |
| Forward-secure revocable identity-based encryption | 2022-06-08 | Paper |
Public-key authenticated encryption with keyword search revisited: security model and constructions Information Sciences | 2021-03-31 | Paper |
(Dual) server-aided revocable attribute-based encryption with decryption key exposure resistance Information Sciences | 2020-12-10 | Paper |
Leakage-resilient hierarchical identity-based encryption with recipient anonymity International Journal of Foundations of Computer Science | 2019-12-10 | Paper |
Efficient and secure big data storage system with leakage resilience in cloud computing Soft Computing | 2018-11-27 | Paper |
On the polynomial basis of \(\mathrm{GF}(2^n)\) having a small number of trace-one elements Mathematical Problems in Engineering | 2018-10-12 | Paper |
| On the degrees of which there exist no self-reciprocal binary irreducible pentanomials | 2018-06-14 | Paper |
Arbitrated quantum signature of quantum messages with a semi-honest arbitrator International Journal of Theoretical Physics | 2018-06-13 | Paper |
RST Invariant Image Watermarking Algorithm With Mathematical Modeling and Analysis of the Watermarking Processes IEEE Transactions on Image Processing | 2017-10-09 | Paper |
Distributed Opportunistic Scheduling for Ad Hoc Networks With Random Access: An Optimal Stopping Approach IEEE Transactions on Information Theory | 2017-08-08 | Paper |
Accountable large-universe attribute-based encryption supporting any monotone access structures Information Security and Privacy | 2016-08-31 | Paper |
Fuzzy search over encrypted data supporting word frequencies and user preferences in cloud storage Journal of Shenzhen University Science and Engineering | 2016-08-10 | Paper |
Computationally efficient ciphertext-policy attribute-based encryption with constant-size ciphertexts Provable Security | 2015-09-29 | Paper |
| Robust strategy of dynamic portfolio with transaction cost | 2015-02-11 | Paper |
| The research progress of robust portfolio optimization | 2015-02-11 | Paper |
Efficient democratic group signatures with threshold traceability Journal of Shanghai Jiaotong University (Science) | 2014-09-02 | Paper |
On the Security of 4-Bit Involutive S-Boxes for Lightweight Designs Information Security Practice and Experience | 2011-05-19 | Paper |
Some remarks on the TKIP key mixing function of IEEE 802.11i Journal of Shanghai Jiaotong University (Science) | 2011-01-05 | Paper |
Human visual system based adaptive digital image watermarking Signal Processing | 2010-05-19 | Paper |
Democratic group signatures with collective traceability Computers and Electrical Engineering | 2009-10-15 | Paper |
Filling the gap between voters and cryptography in e-voting Journal of Shanghai Jiaotong University (Science) | 2009-06-30 | Paper |
RST invariant digital image watermarking based on a new phase-only filtering method Signal Processing | 2009-05-18 | Paper |
The Impact of Stochastic Noisy Feedback on Distributed Network Utility Maximization IEEE Transactions on Information Theory | 2009-02-24 | Paper |
A Tamper-Evident Voting Machine Resistant to Covert Channels Provable Security | 2009-01-27 | Paper |
Identity-Based Threshold Key-Insulated Encryption without Random Oracles Topics in Cryptology – CT-RSA 2008 | 2008-04-24 | Paper |
Analysis of information leakage in quantum key agreement Journal of Shanghai Jiaotong University (Science) | 2006-11-15 | Paper |
Ising spin-based error correcting private-key cryptosystems Journal of Shanghai Jiaotong University (Science) | 2006-11-15 | Paper |
How to play E-lottery games via voting Journal of Shanghai Jiaotong University (Science) | 2006-11-15 | Paper |
Information Security Lecture Notes in Computer Science | 2006-10-20 | Paper |
| scientific article; zbMATH DE number 2222201 (Why is no real title available?) | 2005-11-02 | Paper |
| scientific article; zbMATH DE number 2222200 (Why is no real title available?) | 2005-11-02 | Paper |
| scientific article; zbMATH DE number 2222194 (Why is no real title available?) | 2005-11-02 | Paper |
Multiparty authentication services and key agreement protocols with semi-trusted third party. Journal of Computer Science and Technology | 2004-07-01 | Paper |
High performance sparse static solver in finite element analyses with loop-unrolling. Advances in Engineering Software | 2003-08-13 | Paper |