Variations of diffie-hellman problem F Bao, RH Deng, H Zhu International conference on information and communications security, 301-312, 2003 | 430 | 2003 |
Private data deduplication protocols in cloud storage WK Ng, Y Wen, H Zhu Proceedings of the 27th Annual ACM Symposium on Applied Computing, 441-446, 2012 | 268 | 2012 |
Deniable authentication protocols X Deng, CH Lee, H Zhu IEE Proceedings-Computers and Digital Techniques 148 (2), 101-104, 2001 | 136 | 2001 |
Analysis and improvement of Micali’s fair contract signing protocol F Bao, G Wang, J Zhou, H Zhu Information Security and Privacy: 9th Australasian Conference, ACISP 2004 …, 2004 | 83 | 2004 |
Computing of trust in wireless networks H Zhu, F Bao, RH Deng IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. 2004 4, 2621-2624, 2004 | 50 | 2004 |
A novel two-level trust model for grid TY Li, H Zhu, KY Lam Information and Communications Security: 5th International Conference, ICICS …, 2003 | 43 | 2003 |
Privacy-preserving weighted federated learning within the secret sharing framework H Zhu, RSM Goh, WK Ng IEEE Access 8, 198275-198284, 2020 | 40 | 2020 |
New digital signature scheme attaining immunity to adaptive chosen message attack HF Zhu Chinese Journal of Electronics 10 (4), 484-486, 2001 | 38 | 2001 |
Stand-alone and setup-free verifiably committed signatures H Zhu, F Bao Topics in Cryptology–CT-RSA 2006: The Cryptographers’ Track at the RSA …, 2006 | 36 | 2006 |
Design and security analysis of anonymous group identification protocols CH Lee, X Deng, H Zhu Public Key Cryptography: 5th International Workshop on Practice and Theory …, 2002 | 33 | 2002 |
Computing of trust in distributed networks H Zhu, B Feng, RH Deng Cryptology ePrint Archive, 2003 | 28 | 2003 |
Compact sequential aggregate signatures Y Mu, W Susilo, H Zhu Proceedings of the 2007 ACM symposium on Applied computing, 249-253, 2007 | 24 | 2007 |
Augmented oblivious polynomial evaluation protocol and its applications H Zhu, F Bao Computer Security–ESORICS 2005: 10th European Symposium on Research in …, 2005 | 23 | 2005 |
Multi-party stand-alone and setup-free verifiably committed signatures H Zhu, W Susilo, Y Mu Public Key Cryptography–PKC 2007: 10th International Conference on Practice …, 2007 | 22 | 2007 |
Cloud-enabled data sharing model NT Hung, NW Keong, H Zhu 2012 IEEE International Conference on Intelligence and Security Informatics, 1-6, 2012 | 20 | 2012 |
Sequential aggregate signatures for wireless routing protocols H Zhu, F Bao, T Li, Y Wu IEEE Wireless Communications and Networking Conference, 2005 4, 2436-2439, 2005 | 20 | 2005 |
On the relationship between (secure) multi-party computation and (secure) federated learning H Zhu arXiv preprint arXiv:2008.02609, 2020 | 14 | 2020 |
Privacy-preserving weighted federated learning within oracle-aided MPC framework H Zhu, Z Li, M Cheah, RSM Goh arXiv preprint arXiv:2003.07630, 2020 | 14 | 2020 |
An efficient scheme for encrypted data aggregation on sensor networks T Li, Y Wu, H Zhu 2006 IEEE 63rd Vehicular Technology Conference 2, 831-835, 2006 | 13 | 2006 |
Efficient group signatures from bilinear pairing X Cheng, H Zhu, Y Qiu, X Wang Information Security and Cryptology: First SKLOIS Conference, CISC 2005 …, 2005 | 13 | 2005 |