A blockchain-based storage system with financial incentives for load-balancing H Yin, Z Zhang, L Zhu, M Li, X Du, M Guizani, B Khoussainov IEEE Transactions on Network Science and Engineering 8 (2), 1178-1188, 2020 | 11 | 2020 |
A Blockchain-Enabled Group Covert Channel against Transaction Forgery T Shen, L Zhu, F Gao, Z Chen, Z Zhang, M Li Mathematics 12 (2), 251, 2024 | | 2024 |
A Comparative Evaluation of Automated Analysis Tools for Solidity Smart Contracts Z Wei, J Sun, Z Zhang, X Zhang, M Li, L Zhu arXiv preprint arXiv:2310.20212, 2023 | | 2023 |
A low-latency secure data outsourcing scheme for cloud-wsn J Li, Z Guan, X Du, Z Zhang, Z Zhou 2017 IEEE Wireless Communications and Networking Conference (WCNC), 1-6, 2017 | 5 | 2017 |
A mutual authentication and key update protocol in satellite communication network C Huang, Z Zhang, M Li, L Zhu, Z Zhu, X Yang Automatika: časopis za automatiku, mjerenje, elektroniku, računarstvo i …, 2020 | 11 | 2020 |
A new complex network robustness attack algorithm X Li, Z Zhang, J Liu, K Gai Proceedings of the 2019 ACM international symposium on blockchain and secure …, 2019 | 11 | 2019 |
A new distributed network environment trust evaluation model Z Zhang, H Li, L Zhu, L Liao Journal of Beijing Institute of Technology 28 (9), 153-163, 2012 | | 2012 |
A novel authenticated group key agreement protocol based on elliptic curve Diffie-Hellman H Tang, L Zhu, Z Zhang 2008 4th International Conference on Wireless Communications, Networking and …, 2008 | 7 | 2008 |
A Novel Contributory Cross-domain group password-based authenticated key exchange protocol with adaptive security L Zhu, C Guo, Z Zhang, W Fu, R Xu 2017 IEEE Second International Conference on Data Science in Cyberspace (DSC …, 2017 | 6 | 2017 |
A novel secure group RFID authentication protocol GUO Cong, Z ZHANG, L ZHU, Y TAN, Y Zhen The Journal of China Universities of Posts and Telecommunications 21 (1), 94-103, 2014 | 26 | 2014 |
A perturbed compressed sensing protocol for crowd sensing Z Zhang, C Jin, M Li, L Zhu Mobile Information Systems 2016, 2016 | 9 | 2016 |
A privacy-preserving and efficient information sharing scheme for VANET secure communication G Cong, L Zhu, Z Zhang Security, Privacy and Reliability in Computer Communications and Networks 49, 2016 | 3* | 2016 |
A privacy-preserving and transparent identity management scheme for vehicular social networking S Khan, F Luo, Z Zhang, MA Rahim, S Khan, SF Qadri, K Wu IEEE Transactions on Vehicular Technology 71 (11), 11555-11570, 2022 | 8 | 2022 |
A Privacy-Preserving and Vessel Authentication Scheme Using Automatic Identification System P Su, N Sun, L Zhu, Y Li, R Bi, M Li, Z Zhang 15th ACM International Workshop on Security in Cloud Computing, 83-90, 2017 | 8 | 2017 |
A privacy-preserving video subscription scheme with the limitation of expire date L Zhu, M Chen, Z Zhang, A Tong, C Xu Science China. Information Sciences 60 (9), 098101, 2017 | 1 | 2017 |
A Searchable Re-encryption-based Scheme for Massive Data Transactions Y Yu, R Jin, H Yin, K Gai, Z Zhang 2022 IEEE 9th International Conference on Cyber Security and Cloud Computing …, 2022 | | 2022 |
A secure robust integrity reporting protocol of trusted computing for remote attestation under fully adaptive party corruptions L Zhu, Z Zhang, L Liao, C Guo Future Wireless Networks and Information Systems: Volume 1, 211-217, 2012 | 9 | 2012 |
A survey of remote data integrity checking: Techniques and verification structures C Yu, F Wang, L Zhu, Z Zhang International Journal of Grid and Distributed Computing 8 (4), 179-198, 2015 | 3 | 2015 |
A survey of SCADA test bed ZJ Zhang, Z Yang, LH Zhu, L Xiao, L Zhao International Journal of Wireless and Mobile Computing 8 (1), 9-14, 2015 | 8 | 2015 |
A survey on X. 509 public-key infrastructure, certificate revocation, and their modern implementation on blockchain and ledger technologies S Khan, F Luo, Z Zhang, F Ullah, F Amin, SF Qadri, MBB Heyat, R Ruby, ... IEEE Communications Surveys & Tutorials, 2023 | 10 | 2023 |