Rongxing Lu

From MaRDI portal
Person:849937

Available identifiers

zbMath Open lu.rongxingMaRDI QIDQ849937

List of research outcomes





PublicationDate of PublicationType
Towards privacy-preserving category-aware POI recommendation over encrypted LBSN data2024-04-30Paper
Efficient and privacy-preserving tree-based inference via additive homomorphic encryption2023-11-01Paper
Efficient and secure outsourcing of differentially private data publication2022-08-25Paper
Efficient privacy-preserving data merging and skyline computation over multi-source encrypted data2020-12-10Paper
A Markov adversary model to detect vulnerable iOS devices and vulnerabilities in iOS apps2019-03-27Paper
Secure and flexible cloud-assisted association rule mining over horizontally partitioned databases2017-09-07Paper
A Privacy-Preserving Outsourced Functional Computation Framework Across Large-Scale Multiple Encrypted Domains2017-05-16Paper
Comment on “An Efficient Homomorphic MAC with Small Key Size for Authentication in Network Coding”2017-05-16Paper
User Collusion Avoidance Scheme for Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption2017-05-16Paper
Proxy Re-encryption with Delegatable Verifiability2016-09-02Paper
RCCA-Secure Multi-use Bidirectional Proxy Re-encryption with Master Secret Security2015-09-29Paper
EFADS: efficient, flexible and anonymous data sharing protocol for cloud computing with proxy re-encryption2014-07-29Paper
Querying over Encrypted Data in Smart Grids2014-07-23Paper
Efficient ID-Based One-Time Proxy Signature and Its Application in E-Cheque2009-01-09Paper
A simple deniable authentication protocol based on the Diffie–Hellman algorithm2008-09-24Paper
Designing efficient proxy signature schemes for mobile communication2008-04-15Paper
New \((t, n)\) threshold directed signature scheme with provable security2008-01-11Paper
https://portal.mardi4nfdi.de/entity/Q54319332008-01-02Paper
A new ID-based deniable authentication protocol2007-08-07Paper
Password-based group key agreement protocol for client-server application2007-06-01Paper
An efficient provable secure ID-based proxy signature scheme based on CDH assumption2007-05-09Paper
An improved deniable authentication protocol2007-02-02Paper
Proofs of security for improved Rabin signature scheme2006-11-15Paper
An ID-based authenticated key agreement protocol for peer-to-peer computing2006-11-15Paper
A self-encryption remote user anonymous authentication scheme using smart cards2006-11-15Paper
Cryptology and Network Security2006-11-14Paper
Robust ID-based threshold signcryption scheme from pairings2006-05-26Paper
Designated verifier proxy signature scheme with message recovery2005-11-14Paper
Proxy signature scheme using self-certified public keys2005-11-14Paper
A new deniable authentication protocol from bilinear pairings2005-11-04Paper
Efficient remote user authentication scheme using smart card2005-10-10Paper
A robust \((k,n)+1\) threshold proxy signature scheme based on factoring2005-08-05Paper
Proxy blind multi-signature scheme without a secure channel2005-05-04Paper
Provably secure proxy-protected signature schemes based on factoring2005-05-04Paper
Threshold undeniable signature scheme based on conic2005-02-22Paper

Research outcomes over time

This page was built for person: Rongxing Lu