Dong Zheng

From MaRDI portal
(Redirected from Person:407479)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Two classes of 1-resilient semi-bent functions based on disjoint linear codes
Discrete Applied Mathematics
2024-09-26Paper
Further construction of even-variable balanced rotation symmetric Boolean functions with optimal algebraic immunity
Theoretical Computer Science
2024-08-27Paper
DP-Loc: a differential privacy-based indoor localization scheme with bilateral privacy protection2024-07-19Paper
Server-aided revocable attribute-based encryption resilient to decryption key exposure
Cryptology and Network Security
2023-08-02Paper
Improved security model for public-key authenticated encryption with keyword search2023-04-13Paper
Forward-secure revocable identity-based encryption2022-06-08Paper
Public-key authenticated encryption with keyword search revisited: security model and constructions
Information Sciences
2021-03-31Paper
(Dual) server-aided revocable attribute-based encryption with decryption key exposure resistance
Information Sciences
2020-12-10Paper
Leakage-resilient hierarchical identity-based encryption with recipient anonymity
International Journal of Foundations of Computer Science
2019-12-10Paper
Efficient and secure big data storage system with leakage resilience in cloud computing
Soft Computing
2018-11-27Paper
On the polynomial basis of \(\mathrm{GF}(2^n)\) having a small number of trace-one elements
Mathematical Problems in Engineering
2018-10-12Paper
On the degrees of which there exist no self-reciprocal binary irreducible pentanomials2018-06-14Paper
Arbitrated quantum signature of quantum messages with a semi-honest arbitrator
International Journal of Theoretical Physics
2018-06-13Paper
RST Invariant Image Watermarking Algorithm With Mathematical Modeling and Analysis of the Watermarking Processes
IEEE Transactions on Image Processing
2017-10-09Paper
Distributed Opportunistic Scheduling for Ad Hoc Networks With Random Access: An Optimal Stopping Approach
IEEE Transactions on Information Theory
2017-08-08Paper
Accountable large-universe attribute-based encryption supporting any monotone access structures
Information Security and Privacy
2016-08-31Paper
Fuzzy search over encrypted data supporting word frequencies and user preferences in cloud storage
Journal of Shenzhen University Science and Engineering
2016-08-10Paper
Computationally efficient ciphertext-policy attribute-based encryption with constant-size ciphertexts
Provable Security
2015-09-29Paper
Robust strategy of dynamic portfolio with transaction cost2015-02-11Paper
The research progress of robust portfolio optimization2015-02-11Paper
Efficient democratic group signatures with threshold traceability
Journal of Shanghai Jiaotong University (Science)
2014-09-02Paper
On the Security of 4-Bit Involutive S-Boxes for Lightweight Designs
Information Security Practice and Experience
2011-05-19Paper
Some remarks on the TKIP key mixing function of IEEE 802.11i
Journal of Shanghai Jiaotong University (Science)
2011-01-05Paper
Human visual system based adaptive digital image watermarking
Signal Processing
2010-05-19Paper
Democratic group signatures with collective traceability
Computers and Electrical Engineering
2009-10-15Paper
Filling the gap between voters and cryptography in e-voting
Journal of Shanghai Jiaotong University (Science)
2009-06-30Paper
RST invariant digital image watermarking based on a new phase-only filtering method
Signal Processing
2009-05-18Paper
The Impact of Stochastic Noisy Feedback on Distributed Network Utility Maximization
IEEE Transactions on Information Theory
2009-02-24Paper
A Tamper-Evident Voting Machine Resistant to Covert Channels
Provable Security
2009-01-27Paper
Identity-Based Threshold Key-Insulated Encryption without Random Oracles
Topics in Cryptology – CT-RSA 2008
2008-04-24Paper
Analysis of information leakage in quantum key agreement
Journal of Shanghai Jiaotong University (Science)
2006-11-15Paper
Ising spin-based error correcting private-key cryptosystems
Journal of Shanghai Jiaotong University (Science)
2006-11-15Paper
How to play E-lottery games via voting
Journal of Shanghai Jiaotong University (Science)
2006-11-15Paper
Information Security
Lecture Notes in Computer Science
2006-10-20Paper
scientific article; zbMATH DE number 2222201 (Why is no real title available?)2005-11-02Paper
scientific article; zbMATH DE number 2222200 (Why is no real title available?)2005-11-02Paper
scientific article; zbMATH DE number 2222194 (Why is no real title available?)2005-11-02Paper
Multiparty authentication services and key agreement protocols with semi-trusted third party.
Journal of Computer Science and Technology
2004-07-01Paper
High performance sparse static solver in finite element analyses with loop-unrolling.
Advances in Engineering Software
2003-08-13Paper


Research outcomes over time


This page was built for person: Dong Zheng