Rongxing Lu

From MaRDI portal
(Redirected from Person:849937)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Towards privacy-preserving category-aware POI recommendation over encrypted LBSN data
Information Sciences
2024-04-30Paper
Efficient and privacy-preserving tree-based inference via additive homomorphic encryption
Information Sciences
2023-11-01Paper
Efficient and secure outsourcing of differentially private data publication2022-08-25Paper
Efficient privacy-preserving data merging and skyline computation over multi-source encrypted data
Information Sciences
2020-12-10Paper
A Markov adversary model to detect vulnerable iOS devices and vulnerabilities in iOS apps
Applied Mathematics and Computation
2019-03-27Paper
Secure and flexible cloud-assisted association rule mining over horizontally partitioned databases
Journal of Computer and System Sciences
2017-09-07Paper
A Privacy-Preserving Outsourced Functional Computation Framework Across Large-Scale Multiple Encrypted Domains
IEEE Transactions on Computers
2017-05-16Paper
Comment on “An Efficient Homomorphic MAC with Small Key Size for Authentication in Network Coding”
IEEE Transactions on Computers
2017-05-16Paper
User Collusion Avoidance Scheme for Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption
IEEE Transactions on Computers
2017-05-16Paper
Proxy re-encryption with delegatable verifiability
Information Security and Privacy
2016-09-02Paper
RCCA-secure multi-use bidirectional proxy re-encryption with master secret security
Provable Security
2015-09-29Paper
EFADS: efficient, flexible and anonymous data sharing protocol for cloud computing with proxy re-encryption
Journal of Computer and System Sciences
2014-07-29Paper
Querying over encrypted data in smart grids
SpringerBriefs in Computer Science
2014-07-23Paper
Efficient ID-Based One-Time Proxy Signature and Its Application in E-Cheque
Cryptology and Network Security
2009-01-09Paper
A simple deniable authentication protocol based on the Diffie–Hellman algorithm
International Journal of Computer Mathematics
2008-09-24Paper
Designing efficient proxy signature schemes for mobile communication
Science in China. Series F
2008-04-15Paper
New \((t, n)\) threshold directed signature scheme with provable security
Information Sciences
2008-01-11Paper
scientific article; zbMATH DE number 5222384 (Why is no real title available?)2008-01-02Paper
A new ID-based deniable authentication protocol2007-08-07Paper
Password-based group key agreement protocol for client-server application
Wuhan University Journal of Natural Sciences
2007-06-01Paper
An efficient provable secure ID-based proxy signature scheme based on CDH assumption
Journal of Shanghai Jiaotong University (Science)
2007-05-09Paper
An improved deniable authentication protocol
Networks
2007-02-02Paper
Proofs of security for improved Rabin signature scheme
Journal of Shanghai Jiaotong University (Science)
2006-11-15Paper
An ID-based authenticated key agreement protocol for peer-to-peer computing
Journal of Shanghai Jiaotong University (Science)
2006-11-15Paper
A self-encryption remote user anonymous authentication scheme using smart cards
Journal of Shanghai Jiaotong University (Science)
2006-11-15Paper
Cryptology and Network Security
Lecture Notes in Computer Science
2006-11-14Paper
Robust ID-based threshold signcryption scheme from pairings2006-05-26Paper
Designated verifier proxy signature scheme with message recovery
Applied Mathematics and Computation
2005-11-14Paper
Proxy signature scheme using self-certified public keys
Applied Mathematics and Computation
2005-11-14Paper
A new deniable authentication protocol from bilinear pairings
Applied Mathematics and Computation
2005-11-04Paper
Efficient remote user authentication scheme using smart card
Computer Networks
2005-10-10Paper
A robust \((k,n)+1\) threshold proxy signature scheme based on factoring
Applied Mathematics and Computation
2005-08-05Paper
Proxy blind multi-signature scheme without a secure channel
Applied Mathematics and Computation
2005-05-04Paper
Provably secure proxy-protected signature schemes based on factoring
Applied Mathematics and Computation
2005-05-04Paper
Threshold undeniable signature scheme based on conic
Applied Mathematics and Computation
2005-02-22Paper


Research outcomes over time


This page was built for person: Rongxing Lu