Privacy-preserving authentication for general directed graphs in industrial IoT F Zhu, W Wu, Y Zhang, X Chen Information sciences 502, 218-228, 2019 | 35 | 2019 |
Cost-effective authenticated data redaction with privacy protection in IoT F Zhu, X Yi, A Abuadbba, I Khalil, S Nepal, X Huang IEEE Internet of Things Journal 8 (14), 11678-11689, 2021 | 21 | 2021 |
A security-enhanced certificateless conditional privacy-preserving authentication scheme for vehicular ad hoc networks F Zhu, X Yi, A Abuadbba, I Khalil, X Huang, F Xu IEEE Transactions on Intelligent Transportation Systems 24 (10), 10456-10466, 2023 | 14 | 2023 |
Certificate-based anonymous authentication with efficient aggregation for wireless medical sensor networks F Zhu, X Yi, A Abuadbba, I Khalil, S Nepal, X Huang, X Yan IEEE Internet of Things Journal 9 (14), 12209-12218, 2021 | 13 | 2021 |
Authenticated data sharing with privacy protection and batch verification for healthcare IoT F Zhu, X Yi, A Abuadbba, I Khalil, S Nepal, X Huang IEEE Transactions on Sustainable Computing 8 (1), 32-42, 2022 | 11 | 2022 |
A comprehensive survey on authentication and attack detection schemes that threaten it in vehicular ad-hoc networks S Dong, H Su, Y Xia, F Zhu, X Hu, B Wang IEEE Transactions on Intelligent Transportation Systems, 2023 | 10 | 2023 |
A universal designated multi-verifier transitive signature scheme F Zhu, Y Zhang, C Lin, W Wu, R Meng International Conference on Information Security and Cryptology, 180-195, 2017 | 7 | 2017 |
A new transitive signature scheme C Lin, F Zhu, W Wu, K Liang, KKR Choo International Conference on Network and System Security, 156-167, 2016 | 6 | 2016 |
Efficient hash-based Redactable signature for smart grid applications F Zhu, X Yi, A Abuadbba, J Luo, S Nepal, X Huang European Symposium on Research in Computer Security, 554-573, 2022 | 4 | 2022 |
Efficient and fine-grained sharing of signed healthcare data in smart healthcare J Liu, L Xu, B Gu, L Cui, F Zhu International Conference on Network and System Security, 443-458, 2022 | 3 | 2022 |
Cryptanalysis and improvements of an efficient certificate-based proxy signature scheme for IIoT environments F Zhu, F Xu, X Yang, X Yi, A Abuadbba Information Processing Letters 173, 106170, 2022 | 3 | 2022 |
Privacy-preserving authentication for tree-structured data with designated verification in outsourced environments F Zhu, X Yi, S Abuadbba, I Khalil, X Yang, S Nepal, X Huang Provable and Practical Security: 14th International Conference, ProvSec 2020 …, 2020 | 2 | 2020 |
A proxy transitive signature scheme F Zhu, X Tao, C Lin, W Wu Journal of Internet Technology 19 (4), 1273-1284, 2018 | 2 | 2018 |
PTLVD: Program Slicing and Transformer-based Line-level Vulnerability Detection System T Peng, S Chen, F Zhu, J Tang, J Liu, X Hu 2023 IEEE 23rd International Working Conference on Source Code Analysis and …, 2023 | 1 | 2023 |
Forward-secure edge authentication for graphs F Zhu, X Yi, A Abuadbba, I Khalil, S Nepal, X Huang The Computer Journal 65 (7), 1653-1665, 2022 | 1 | 2022 |
Lightweight Verifiable Privacy-Preserving Data Aggregation for Smart Grids F Zhu, D Guo, S Abuadbba, X Yi, J Luo, S Kumari, T Peng IEEE Internet of Things Journal, 2024 | | 2024 |
Secure Reputation-Based Authentication With Malicious Detection in VANETs X Yang, F Zhu, X Yang, J Luo, X Yi, J Ning, X Huang IEEE Transactions on Dependable and Secure Computing, 2024 | | 2024 |
Patch-Based Backdoors Detection and Mitigation with Feature Masking T Wang, X Zhang, Y Jin, C Chen, F Zhu International Symposium on Security and Privacy in Social Networks and Big …, 2022 | | 2022 |
Signature-based privacy-preserving data authentication for IoT F Zhu RMIT University, 2022 | | 2022 |