| Publication | Date of Publication | Type |
|---|
Towards privacy-preserving category-aware POI recommendation over encrypted LBSN data Information Sciences | 2024-04-30 | Paper |
Efficient and privacy-preserving tree-based inference via additive homomorphic encryption Information Sciences | 2023-11-01 | Paper |
| Efficient and secure outsourcing of differentially private data publication | 2022-08-25 | Paper |
Efficient privacy-preserving data merging and skyline computation over multi-source encrypted data Information Sciences | 2020-12-10 | Paper |
A Markov adversary model to detect vulnerable iOS devices and vulnerabilities in iOS apps Applied Mathematics and Computation | 2019-03-27 | Paper |
Secure and flexible cloud-assisted association rule mining over horizontally partitioned databases Journal of Computer and System Sciences | 2017-09-07 | Paper |
A Privacy-Preserving Outsourced Functional Computation Framework Across Large-Scale Multiple Encrypted Domains IEEE Transactions on Computers | 2017-05-16 | Paper |
Comment on “An Efficient Homomorphic MAC with Small Key Size for Authentication in Network Coding” IEEE Transactions on Computers | 2017-05-16 | Paper |
User Collusion Avoidance Scheme for Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption IEEE Transactions on Computers | 2017-05-16 | Paper |
Proxy re-encryption with delegatable verifiability Information Security and Privacy | 2016-09-02 | Paper |
RCCA-secure multi-use bidirectional proxy re-encryption with master secret security Provable Security | 2015-09-29 | Paper |
EFADS: efficient, flexible and anonymous data sharing protocol for cloud computing with proxy re-encryption Journal of Computer and System Sciences | 2014-07-29 | Paper |
Querying over encrypted data in smart grids SpringerBriefs in Computer Science | 2014-07-23 | Paper |
Efficient ID-Based One-Time Proxy Signature and Its Application in E-Cheque Cryptology and Network Security | 2009-01-09 | Paper |
A simple deniable authentication protocol based on the Diffie–Hellman algorithm International Journal of Computer Mathematics | 2008-09-24 | Paper |
Designing efficient proxy signature schemes for mobile communication Science in China. Series F | 2008-04-15 | Paper |
New \((t, n)\) threshold directed signature scheme with provable security Information Sciences | 2008-01-11 | Paper |
| scientific article; zbMATH DE number 5222384 (Why is no real title available?) | 2008-01-02 | Paper |
| A new ID-based deniable authentication protocol | 2007-08-07 | Paper |
Password-based group key agreement protocol for client-server application Wuhan University Journal of Natural Sciences | 2007-06-01 | Paper |
An efficient provable secure ID-based proxy signature scheme based on CDH assumption Journal of Shanghai Jiaotong University (Science) | 2007-05-09 | Paper |
An improved deniable authentication protocol Networks | 2007-02-02 | Paper |
Proofs of security for improved Rabin signature scheme Journal of Shanghai Jiaotong University (Science) | 2006-11-15 | Paper |
An ID-based authenticated key agreement protocol for peer-to-peer computing Journal of Shanghai Jiaotong University (Science) | 2006-11-15 | Paper |
A self-encryption remote user anonymous authentication scheme using smart cards Journal of Shanghai Jiaotong University (Science) | 2006-11-15 | Paper |
Cryptology and Network Security Lecture Notes in Computer Science | 2006-11-14 | Paper |
| Robust ID-based threshold signcryption scheme from pairings | 2006-05-26 | Paper |
Designated verifier proxy signature scheme with message recovery Applied Mathematics and Computation | 2005-11-14 | Paper |
Proxy signature scheme using self-certified public keys Applied Mathematics and Computation | 2005-11-14 | Paper |
A new deniable authentication protocol from bilinear pairings Applied Mathematics and Computation | 2005-11-04 | Paper |
Efficient remote user authentication scheme using smart card Computer Networks | 2005-10-10 | Paper |
A robust \((k,n)+1\) threshold proxy signature scheme based on factoring Applied Mathematics and Computation | 2005-08-05 | Paper |
Proxy blind multi-signature scheme without a secure channel Applied Mathematics and Computation | 2005-05-04 | Paper |
Provably secure proxy-protected signature schemes based on factoring Applied Mathematics and Computation | 2005-05-04 | Paper |
Threshold undeniable signature scheme based on conic Applied Mathematics and Computation | 2005-02-22 | Paper |