The following pages link to Jianying Zhou (Q394726):
Displaying 50 items.
- How to achieve non-repudiation of origin with privacy protection in cloud computing (Q394727) (← links)
- Routing optimization security in mobile IPv6 (Q871131) (← links)
- Structural instability of the mapping z\(\to \lambda \,\exp (z)(\lambda >e^{-1})\) (Q916825) (← links)
- On the efficiency of multi-party contract signing protocols (Q1799248) (← links)
- Layering quantum-resistance into classical digital signature algorithms (Q2154036) (← links)
- Lightweight delegatable proofs of storage (Q2165474) (← links)
- A modular hybrid learning approach for black-box security testing of CPS (Q2291386) (← links)
- Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts (Q2453123) (← links)
- Privacy-Preserving k-Nearest Neighbour Query on Outsourced Database (Q2817461) (← links)
- Dynamic Secure Cloud Storage with Provenance (Q2889794) (← links)
- <inline-formula><tex-math>$k$</tex-math><alternatives> <inline-graphic xlink:type="simple" xlink:href="huang-ieq1-2366741.gif"/></alternatives></inline-formula>-Times Attribute-Based Anonymous Access Control for C (Q2982110) (← links)
- Cost-Effective Authentic and Anonymous Data Sharing with Forward Security (Q2982309) (← links)
- (Q3001126) (← links)
- Identity-Based Server-Aided Decryption (Q3013001) (← links)
- Online/Offline Identity-Based Signcryption Revisited (Q3019914) (← links)
- Optionally Identifiable Private Handshakes (Q3056894) (← links)
- On Shortening Ciphertexts: New Constructions for Compact Public Key and Stateful Encryption Schemes (Q3073714) (← links)
- (Q3102014) (← links)
- (Q3109055) (← links)
- Validating Digital Signatures without TTP’s Time-Stamping and Certificate Revocation (Q3404396) (← links)
- Producing negative permittivity via quantum coherence and local field effect in dense media (Q3430760) (← links)
- Trust based pervasive computing (Q3443192) (← links)
- Generic Constructions of Stateful Public Key Encryption and Their Applications (Q3506403) (← links)
- A New Formal Proof Model for RFID Location Privacy (Q3533963) (← links)
- Efficient Certificate-Based Encryption in the Standard Model (Q3540041) (← links)
- Constructing Strong KEM from Weak KEM (or How to Revive the KEM/DEM Framework) (Q3540057) (← links)
- Certificate-Based Signature Schemes without Pairings or Random Oracles (Q3540152) (← links)
- Model Generalization and Its Implications on Intrusion Detection (Q3593147) (← links)
- Fuzzy Identity-based Encryption: New and Efficient Schemes (Q3614592) (← links)
- Conditional Proxy Broadcast Re-Encryption (Q3634503) (← links)
- Self-enforcing Private Inference Control (Q3651596) (← links)
- (Q3729720) (← links)
- (Q3732609) (← links)
- (Q3744940) (← links)
- (Q3778291) (← links)
- (Q3954123) (← links)
- (Q4250644) (← links)
- (Q4250674) (← links)
- (Q4263445) (← links)
- (Q4271831) (← links)
- (Q4412987) (← links)
- (Q4442367) (← links)
- (Q4473594) (← links)
- (Q4536258) (← links)
- (Q4950034) (← links)
- A New Functional Encryption for Multidimensional Range Query (Short Paper) (Q5056029) (← links)
- Leakage Resilient Proofs of Ownership in Cloud Storage, Revisited (Q5168536) (← links)
- PPDCP-ABE: Privacy-Preserving Decentralized Ciphertext-Policy Attribute-Based Encryption (Q5264485) (← links)
- Information Security and Privacy (Q5315256) (← links)
- Information and Communications Security (Q5393985) (← links)