iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://dblp.dagstuhl.de/pid/52/2707.rss
dblp: Wen Tao Zhu https://dblp.org/pid/52/2707.html dblp person page RSS feed Mon, 07 Oct 2024 21:26:12 +0200 en-US daily 1 released under the CC0 1.0 license dblp@dagstuhl.de (dblp team) dblp@dagstuhl.de (dblp team) Computers/Computer_Science/Publications/Bibliographies http://www.rssboard.org/rss-specification https://dblp.org/img/logo.144x51.pngdblp: Wen Tao Zhuhttps://dblp.org/pid/52/2707.html14451 5G evolution promoting innovation of antenna systems.https://doi.org/10.1631/FITEE.1900561, , , , , :
5G evolution promoting innovation of antenna systems. Frontiers Inf. Technol. Electron. Eng. 21(1): 188-194 ()]]>
https://dblp.org/rec/journals/jzusc/GaoGZZMS20Wed, 01 Jan 2020 00:00:00 +0100
Investigating the Multi-Ciphersuite and Backwards-Compatibility Security of the Upcoming TLS 1.3.https://doi.org/10.1109/TDSC.2017.2685382, , , :
Investigating the Multi-Ciphersuite and Backwards-Compatibility Security of the Upcoming TLS 1.3. IEEE Trans. Dependable Secur. Comput. 16(2): 272-286 ()]]>
https://dblp.org/rec/journals/tdsc/LanXZZ19Tue, 01 Jan 2019 00:00:00 +0100
User-friendly deniable storage for mobile devices.https://doi.org/10.1016/j.cose.2017.09.005, , , , , , :
User-friendly deniable storage for mobile devices. Comput. Secur. 72: 163-174 ()]]>
https://dblp.org/rec/journals/compsec/ChangCCZZLW18Mon, 01 Jan 2018 00:00:00 +0100
Making a good thing better: enhancing password/PIN-based user authentication with smartwatch.https://doi.org/10.1186/s42400-018-0009-4, , , , :
Making a good thing better: enhancing password/PIN-based user authentication with smartwatch. Cybersecur. 1(1): 7 ()]]>
https://dblp.org/rec/journals/cybersec/ChangLWZD18Mon, 01 Jan 2018 00:00:00 +0100
Harnessing the Cloud for Secure and Efficient Outsourcing of Non-negative Matrix Factorization.https://doi.org/10.1109/CNS.2018.8433195, , , :
Harnessing the Cloud for Secure and Efficient Outsourcing of Non-negative Matrix Factorization. CNS : 1-9]]>
https://dblp.org/rec/conf/cns/PanZZW18Mon, 01 Jan 2018 00:00:00 +0100
SoundAuth: Secure Zero-Effort Two-Factor Authentication Based on Audio Signals.https://doi.org/10.1109/CNS.2018.8433202, , , :
SoundAuth: Secure Zero-Effort Two-Factor Authentication Based on Audio Signals. CNS : 1-9]]>
https://dblp.org/rec/conf/cns/WangZYW18Mon, 01 Jan 2018 00:00:00 +0100
MobiCeal: Towards Secure and Practical Plausibly Deniable Encryption on Mobile Devices.https://doi.org/10.1109/DSN.2018.00054, , , , , , , :
MobiCeal: Towards Secure and Practical Plausibly Deniable Encryption on Mobile Devices. DSN : 454-465]]>
https://dblp.org/rec/conf/dsn/ChangZCLZTWC18Mon, 01 Jan 2018 00:00:00 +0100
Secure and Efficient Outsourcing of Large-Scale Overdetermined Systems of Linear Equations.https://doi.org/10.1007/978-3-030-01701-9_29, , , :
Secure and Efficient Outsourcing of Large-Scale Overdetermined Systems of Linear Equations. SecureComm (1) : 529-548]]>
https://dblp.org/rec/conf/securecomm/PanZWC18Mon, 01 Jan 2018 00:00:00 +0100
EvoPass: Evolvable graphical password against shoulder-surfing attacks.https://doi.org/10.1016/j.cose.2017.05.006, , , , , :
EvoPass: Evolvable graphical password against shoulder-surfing attacks. Comput. Secur. 70: 179-198 ()]]>
https://dblp.org/rec/journals/compsec/YuWLLZS17Sun, 01 Jan 2017 00:00:00 +0100
An Efficient Elliptic Curve Cryptography Signature Server With GPU Acceleration.https://doi.org/10.1109/TIFS.2016.2603974, , , , :
An Efficient Elliptic Curve Cryptography Signature Server With GPU Acceleration. IEEE Trans. Inf. Forensics Secur. 12(1): 111-122 ()]]>
https://dblp.org/rec/journals/tifs/PanZZZJ17Sun, 01 Jan 2017 00:00:00 +0100
Employing Smartwatch for Enhanced Password Authentication.https://doi.org/10.1007/978-3-319-60033-8_59, , , , , :
Employing Smartwatch for Enhanced Password Authentication. WASA : 691-703]]>
https://dblp.org/rec/conf/wasa/ChangLLWZW17Sun, 01 Jan 2017 00:00:00 +0100
A Secure and Fast Dispersal Storage Scheme Based on the Learning with Errors Problem.http://eprint.iacr.org/2017/105, , , , , , :
A Secure and Fast Dispersal Storage Scheme Based on the Learning with Errors Problem. IACR Cryptol. ePrint Arch. 2017: 105 ()]]>
https://dblp.org/rec/journals/iacr/YangFLZWYP17Sun, 01 Jan 2017 00:00:00 +0100
PRAC: Efficient privacy protection for vehicle-to-grid communications in the smart grid.https://doi.org/10.1016/j.cose.2016.07.004, , :
PRAC: Efficient privacy protection for vehicle-to-grid communications in the smart grid. Comput. Secur. 62: 246-256 ()]]>
https://dblp.org/rec/journals/compsec/WanZW16Fri, 01 Jan 2016 00:00:00 +0100
Generating Correlated Digital Certificates: Framework and Applications.https://doi.org/10.1109/TIFS.2016.2516818, :
Generating Correlated Digital Certificates: Framework and Applications. IEEE Trans. Inf. Forensics Secur. 11(6): 1117-1127 ()]]>
https://dblp.org/rec/journals/tifs/ZhuL16Fri, 01 Jan 2016 00:00:00 +0100
Towards Privacy-Preserving Data Mining in Online Social Networks: Distance-Grained and Item-Grained Differential Privacy.https://doi.org/10.1007/978-3-319-40253-6_9, , , :
Towards Privacy-Preserving Data Mining in Online Social Networks: Distance-Grained and Item-Grained Differential Privacy. ACISP (1) : 141-157]]>
https://dblp.org/rec/conf/acisp/YanPZZ16Fri, 01 Jan 2016 00:00:00 +0100
Security Analysis on Privacy-Preserving Cloud Aided Biometric Identification Schemes.https://doi.org/10.1007/978-3-319-40367-0_29, , :
Security Analysis on Privacy-Preserving Cloud Aided Biometric Identification Schemes. ACISP (2) : 446-453]]>
https://dblp.org/rec/conf/acisp/PanYZ16Fri, 01 Jan 2016 00:00:00 +0100
Privacy Breach by Exploiting postMessage in HTML5: Identification, Evaluation, and Countermeasure.https://doi.org/10.1145/2897845.2897901, , , :
Privacy Breach by Exploiting postMessage in HTML5: Identification, Evaluation, and Countermeasure. AsiaCCS : 629-640]]>
https://dblp.org/rec/conf/ccs/GuanSWZ16Fri, 01 Jan 2016 00:00:00 +0100
DynaEgo: Privacy-Preserving Collaborative Filtering Recommender System Based on Social-Aware Differential Privacy.https://doi.org/10.1007/978-3-319-50011-9_27, , , :
DynaEgo: Privacy-Preserving Collaborative Filtering Recommender System Based on Social-Aware Differential Privacy. ICICS : 347-357]]>
https://dblp.org/rec/conf/icics/YanPZC16Fri, 01 Jan 2016 00:00:00 +0100
A Secure and Fast Dispersal Storage Scheme Based on the Learning with Errors Problem.https://doi.org/10.1007/978-3-319-59608-2_23, , , , , , :
A Secure and Fast Dispersal Storage Scheme Based on the Learning with Errors Problem. SecureComm : 392-411]]>
https://dblp.org/rec/conf/securecomm/YangFLZWYP16Fri, 01 Jan 2016 00:00:00 +0100
RIKE+ : using revocable identities to support key escrow in public key infrastructures with flexibility.https://doi.org/10.1049/iet-ifs.2013.0552, , , , , :
RIKE+ : using revocable identities to support key escrow in public key infrastructures with flexibility. IET Inf. Secur. 9(2): 136-147 ()]]>
https://dblp.org/rec/journals/iet-ifs/LinZWZJG15Thu, 01 Jan 2015 00:00:00 +0100
WAVE: Secure Wireless Pairing Exploiting Human Body Movements.https://doi.org/10.1109/Trustcom.2015.512, , , :
WAVE: Secure Wireless Pairing Exploiting Human Body Movements. TrustCom/BigDataSE/ISPA (1) : 1243-1248]]>
https://dblp.org/rec/conf/trustcom/WangWZW15Thu, 01 Jan 2015 00:00:00 +0100
Publishing and sharing encrypted data with potential friends in online social networks.https://doi.org/10.1002/sec.806, , :
Publishing and sharing encrypted data with potential friends in online social networks. Secur. Commun. Networks 7(2): 409-421 ()]]>
https://dblp.org/rec/journals/scn/ShuaiZL14Wed, 01 Jan 2014 00:00:00 +0100
Remotely wiping sensitive data on stolen smartphones.https://doi.org/10.1145/2590296.2590318, , , , , :
Remotely wiping sensitive data on stolen smartphones. AsiaCCS : 537-542]]>
https://dblp.org/rec/conf/ccs/YuWSZGJ14Wed, 01 Jan 2014 00:00:00 +0100
MobiHydra: Pragmatic and Multi-level Plausibly Deniable Encryption Storage for Mobile Devices.https://doi.org/10.1007/978-3-319-13257-0_36, , , , , :
MobiHydra: Pragmatic and Multi-level Plausibly Deniable Encryption Storage for Mobile Devices. ISC : 555-567]]>
https://dblp.org/rec/conf/isw/YuCWCZJ14Wed, 01 Jan 2014 00:00:00 +0100
A Generic Framework for Anonymous Authentication in Mobile Networks.https://doi.org/10.1007/s11390-013-1371-z, :
A Generic Framework for Anonymous Authentication in Mobile Networks. J. Comput. Sci. Technol. 28(4): 732-742 ()]]>
https://dblp.org/rec/journals/jcst/XuZ13Tue, 01 Jan 2013 00:00:00 +0100
Towards secure and communication-efficient broadcast encryption systems.https://doi.org/10.1016/j.jnca.2012.09.007:
Towards secure and communication-efficient broadcast encryption systems. J. Netw. Comput. Appl. 36(1): 178-186 ()]]>
https://dblp.org/rec/journals/jnca/Zhu13Tue, 01 Jan 2013 00:00:00 +0100
Security Concerns in Popular Cloud Storage Services.https://doi.org/10.1109/MPRV.2013.72, , , , , :
Security Concerns in Popular Cloud Storage Services. IEEE Pervasive Comput. 12(4): 50-57 ()]]>
https://dblp.org/rec/journals/pervasive/ChuZHLXZ13Tue, 01 Jan 2013 00:00:00 +0100
Preserving User Privacy in the Smart Grid by Hiding Appliance Load Characteristics.https://doi.org/10.1007/978-3-319-03584-0_6, :
Preserving User Privacy in the Smart Grid by Hiding Appliance Load Characteristics. CSS : 67-80]]>
https://dblp.org/rec/conf/css/GeZ13Tue, 01 Jan 2013 00:00:00 +0100
Detecting node replication attacks in wireless sensor networks: A survey.https://doi.org/10.1016/j.jnca.2012.01.002, , , :
Detecting node replication attacks in wireless sensor networks: A survey. J. Netw. Comput. Appl. 35(3): 1022-1034 ()]]>
https://dblp.org/rec/journals/jnca/ZhuZDB12Sun, 01 Jan 2012 00:00:00 +0100
Detecting node replication attacks in mobile sensor networks: theory and approaches.https://doi.org/10.1002/sec.338, , , :
Detecting node replication attacks in mobile sensor networks: theory and approaches. Secur. Commun. Networks 5(5): 496-507 ()]]>
https://dblp.org/rec/journals/scn/ZhuZDB12Sun, 01 Jan 2012 00:00:00 +0100
A Comment on "MABS: Multicast Authentication Based on Batch Signature".https://doi.org/10.1109/TMC.2012.119:
A Comment on "MABS: Multicast Authentication Based on Batch Signature". IEEE Trans. Mob. Comput. 11(11): 1775-1776 ()]]>
https://dblp.org/rec/journals/tmc/Zhu12Sun, 01 Jan 2012 00:00:00 +0100
F5P5: Keyword Search over Encrypted Data with Five Functions and Five Privacy Assurances.https://doi.org/10.1007/978-3-642-34129-8_40, :
F5P5: Keyword Search over Encrypted Data with Five Functions and Five Privacy Assurances. ICICS : 416-426]]>
https://dblp.org/rec/conf/icics/ShuaiZ12Sun, 01 Jan 2012 00:00:00 +0100
Masque: Access Control for Interactive Sharing of Encrypted Data in Social Networks.https://doi.org/10.1007/978-3-642-34601-9_38, :
Masque: Access Control for Interactive Sharing of Encrypted Data in Social Networks. NSS : 503-515]]>
https://dblp.org/rec/conf/nss/ShuaiZ12Sun, 01 Jan 2012 00:00:00 +0100
An efficient mutual authentication and key agreement protocol preserving user anonymity in mobile networks.https://doi.org/10.1016/j.comcom.2010.04.041, , :
An efficient mutual authentication and key agreement protocol preserving user anonymity in mobile networks. Comput. Commun. 34(3): 319-325 ()]]>
https://dblp.org/rec/journals/comcom/XuZF11Sat, 01 Jan 2011 00:00:00 +0100
A generic framework for constructing cross-realm C2C-PAKA protocols based on the smart card.https://doi.org/10.1002/cpe.1616, , :
A generic framework for constructing cross-realm C2C-PAKA protocols based on the smart card. Concurr. Comput. Pract. Exp. 23(12): 1386-1398 ()]]>
https://dblp.org/rec/journals/concurrency/XuZJ11Sat, 01 Jan 2011 00:00:00 +0100
A secure and efficient data aggregation scheme for wireless sensor networks.https://doi.org/10.1002/cpe.1615, , :
A secure and efficient data aggregation scheme for wireless sensor networks. Concurr. Comput. Pract. Exp. 23(12): 1414-1430 ()]]>
https://dblp.org/rec/journals/concurrency/ZhuGX11Sat, 01 Jan 2011 00:00:00 +0100
Secure localization with attack detection in wireless sensor networks.https://doi.org/10.1007/s10207-011-0127-4, , , , :
Secure localization with attack detection in wireless sensor networks. Int. J. Inf. Sec. 10(3): 155-171 ()]]>
https://dblp.org/rec/journals/ijisec/ZhuXZDB11Sat, 01 Jan 2011 00:00:00 +0100
Secure mobile subscription of sensor-encrypted data.https://doi.org/10.1145/1966913.1966943, , , , :
Secure mobile subscription of sensor-encrypted data. AsiaCCS : 228-237]]>
https://dblp.org/rec/conf/ccs/ChuZCZD11Sat, 01 Jan 2011 00:00:00 +0100
Applying Time-Bound Hierarchical Key Assignment in Wireless Sensor Networks.https://doi.org/10.1007/978-3-642-25243-3_25, , , :
Applying Time-Bound Hierarchical Key Assignment in Wireless Sensor Networks. ICICS : 306-318]]>
https://dblp.org/rec/conf/icics/ZhuDZB11Sat, 01 Jan 2011 00:00:00 +0100
A Smart Card based Generic Construction for Anonymous Authentication in Mobile Networks.https://dblp.org/pid/52/2707.html, , :
A Smart Card based Generic Construction for Anonymous Authentication in Mobile Networks. SECRYPT : 269-274]]>
https://dblp.org/rec/conf/secrypt/XuZF11Sat, 01 Jan 2011 00:00:00 +0100
Time-Bound Hierarchical Key Assignment: An Overview.https://doi.org/10.1587/transinf.E93.D.1044, , , :
Time-Bound Hierarchical Key Assignment: An Overview. IEICE Trans. Inf. Syst. 93-D(5): 1044-1052 ()]]>
https://dblp.org/rec/journals/ieicet/ZhuDZB10Fri, 01 Jan 2010 00:00:00 +0100
New Constructions for Identity-Based Unidirectional Proxy Re-Encryption.https://doi.org/10.1007/s11390-010-9366-5, , , , :
New Constructions for Identity-Based Unidirectional Proxy Re-Encryption. J. Comput. Sci. Technol. 25(4): 793-806 ()]]>
https://dblp.org/rec/journals/jcst/LaiZDLK10Fri, 01 Jan 2010 00:00:00 +0100
Protecting Source Location Privacy in Wireless Sensor Networks with Data Aggregation.https://doi.org/10.1007/978-3-642-16355-5_22, :
Protecting Source Location Privacy in Wireless Sensor Networks with Data Aggregation. UIC : 252-266]]>
https://dblp.org/rec/conf/uic/YangZ10Fri, 01 Jan 2010 00:00:00 +0100
An improved smart card based password authentication scheme with provable security.https://doi.org/10.1016/j.csi.2008.09.006, , :
An improved smart card based password authentication scheme with provable security. Comput. Stand. Interfaces 31(4): 723-728 ()]]>
https://dblp.org/rec/journals/csi/XuZF09Thu, 01 Jan 2009 00:00:00 +0100
Propagation of active worms: A survey.https://dblp.org/pid/52/2707.html, , :
Propagation of active worms: A survey. Comput. Syst. Sci. Eng. 24(3) ()]]>
https://dblp.org/rec/journals/csse/XiangFZ09Thu, 01 Jan 2009 00:00:00 +0100
Collision Attacks With Budget Constraints on Key Management Schemes for Secure Multimedia Multicast.https://doi.org/10.1109/TMM.2009.2012920:
Collision Attacks With Budget Constraints on Key Management Schemes for Secure Multimedia Multicast. IEEE Trans. Multim. 11(3): 556-561 ()]]>
https://dblp.org/rec/journals/tmm/Zhu09Thu, 01 Jan 2009 00:00:00 +0100
Argus: A Light-Weighted Secure Localization Scheme for Sensor Networks.https://doi.org/10.1007/978-3-642-02704-8_13, :
Argus: A Light-Weighted Secure Localization Scheme for Sensor Networks. ATC : 164-178]]>
https://dblp.org/rec/conf/atc/ZhuX09Thu, 01 Jan 2009 00:00:00 +0100
Security of the redefined Liaw's broadcasting cryptosystem.https://doi.org/10.1016/j.camwa.2008.03.025, :
Security of the redefined Liaw's broadcasting cryptosystem. Comput. Math. Appl. 56(7): 1665-1667 ()]]>
https://dblp.org/rec/journals/cma/ZhuW08Tue, 01 Jan 2008 00:00:00 +0100
A Cost-Efficient Secure Multimedia Proxy System.https://doi.org/10.1109/TMM.2008.2001376:
A Cost-Efficient Secure Multimedia Proxy System. IEEE Trans. Multim. 10(6): 1214-1220 ()]]>
https://dblp.org/rec/journals/tmm/Zhu08Tue, 01 Jan 2008 00:00:00 +0100
General Weakness in Certain Broadcast Encryption Protocols Employing the Remainder Approach.https://doi.org/10.1109/ICC.2008.313:
General Weakness in Certain Broadcast Encryption Protocols Employing the Remainder Approach. ICC : 1620-1624]]>
https://dblp.org/rec/conf/icc/Zhu08Tue, 01 Jan 2008 00:00:00 +0100
Analyzing Euler-Fermat Theorem Based Multicast Key Distribution Schemes with Chinese Remainder Theorem.https://doi.org/10.1109/NPC.2008.29:
Analyzing Euler-Fermat Theorem Based Multicast Key Distribution Schemes with Chinese Remainder Theorem. NPC Workshops : 11-17]]>
https://dblp.org/rec/conf/npc/Zhu08Tue, 01 Jan 2008 00:00:00 +0100
A Dual-Head Cluster Based Secure Aggregation Scheme for Sensor Networks.https://doi.org/10.1109/NPC.2008.31, :
A Dual-Head Cluster Based Secure Aggregation Scheme for Sensor Networks. NPC Workshops : 103-110]]>
https://dblp.org/rec/conf/npc/GaoZ08Tue, 01 Jan 2008 00:00:00 +0100
Remarks on a Hypersphere Oriented Multiparty Key Agreement Protocol.https://doi.org/10.1109/WCNC.2007.503:
Remarks on a Hypersphere Oriented Multiparty Key Agreement Protocol. WCNC : 2709-2713]]>
https://dblp.org/rec/conf/wcnc/Zhu07Mon, 01 Jan 2007 00:00:00 +0100
Optimizing the tree structure in secure multicast key management.https://doi.org/10.1109/LCOMM.2005.1431177:
Optimizing the tree structure in secure multicast key management. IEEE Commun. Lett. 9(5): 477-479 ()]]>
https://dblp.org/rec/journals/icl/Zhu05Sat, 01 Jan 2005 00:00:00 +0100
Cryptanalysis of Two Group Key Management Protocols for Secure Multicast.https://doi.org/10.1007/11599371_4:
Cryptanalysis of Two Group Key Management Protocols for Secure Multicast. CANS : 35-48]]>
https://dblp.org/rec/conf/cans/Zhu05Sat, 01 Jan 2005 00:00:00 +0100
Rethinking of Iolus: Constructing the Secure Multicast Infrastructure.https://doi.org/10.1007/978-3-540-25978-7_90, , :
Rethinking of Iolus: Constructing the Secure Multicast Infrastructure. ICOIN : 895-904]]>
https://dblp.org/rec/conf/icoin/ZhuLH04Thu, 01 Jan 2004 00:00:00 +0100