The following pages link to Dong Zheng (Q407479):
Displaying 22 items.
- Efficient democratic group signatures with threshold traceability (Q407480) (← links)
- Some remarks on the TKIP key mixing function of IEEE 802.11i (Q615203) (← links)
- Democratic group signatures with collective traceability (Q733294) (← links)
- Ising spin-based error correcting private-key cryptosystems (Q849946) (← links)
- Analysis of information leakage in quantum key agreement (Q849948) (← links)
- How to play E-lottery games via voting (Q849956) (← links)
- Human visual system based adaptive digital image watermarking (Q971199) (← links)
- RST invariant digital image watermarking based on a new phase-only filtering method (Q1017227) (← links)
- Filling the gap between voters and cryptography in e-voting (Q1028368) (← links)
- High performance sparse static solver in finite element analyses with loop-unrolling. (Q1400212) (← links)
- Multiparty authentication services and key agreement protocols with semi-trusted third party. (Q1433952) (← links)
- Efficient and secure big data storage system with leakage resilience in cloud computing (Q1626278) (← links)
- Arbitrated quantum signature of quantum messages with a semi-honest arbitrator (Q1640098) (← links)
- On the polynomial basis of \(\mathrm{GF}(2^n)\) having a small number of trace-one elements (Q1793753) (← links)
- (Dual) server-aided revocable attribute-based encryption with decryption key exposure resistance (Q2214962) (← links)
- Public-key authenticated encryption with keyword search revisited: security model and constructions (Q2660908) (← links)
- Forward-secure revocable identity-based encryption (Q2673062) (← links)
- Improved security model for public-key authenticated encryption with keyword search (Q2697905) (← links)
- Accountable Large-Universe Attribute-Based Encryption Supporting Any Monotone Access Structures (Q2817489) (← links)
- Computationally Efficient Ciphertext-Policy Attribute-Based Encryption with Constant-Size Ciphertexts (Q2948155) (← links)
- Fuzzy search over encrypted data supporting word frequencies and user preferences in cloud storage (Q2993157) (← links)
- On the Security of 4-Bit Involutive S-Boxes for Lightweight Designs (Q3001882) (← links)