关注
lei zhang
lei zhang
在 thomsonreuters.com 的电子邮件经过验证
标题
引用次数
引用次数
年份
Two secret sharing schemes based on Boolean operations
D Wang, L Zhang, N Ma, X Li
Pattern Recognition 40 (10), 2776-2785, 2007
3382007
Information disclosure under realistic assumptions: Privacy versus optimality
L Zhang, S Jajodia, A Brodsky
Proceedings of the 14th ACM conference on Computer and communications …, 2007
952007
Toward information sharing: Benefit and risk access control (barac)
L Zhang, A Brodsky, S Jajodia
Seventh IEEE International Workshop on Policies for Distributed Systems and …, 2006
822006
Privacy‐preserving robust data aggregation in wireless sensor networks
M Conti, L Zhang, S Roy, R Di Pietro, S Jajodia, LV Mancini
Security and Communication Networks 2 (2), 195-213, 2009
76*2009
Preserving privacy against external and internal threats in WSN data aggregation
L Zhang, H Zhang, M Conti, R Di Pietro, S Jajodia, LV Mancini
Telecommunication Systems 52, 2163-2176, 2013
392013
Event Driven Email Revocation
A Stavrou, S Jajodia, L Zhang
US Patent App. 20,100/057,869, 2009
132009
L-cover: Preserving diversity by anonymity
L Zhang, L Wang, S Jajodia, A Brodsky
Secure Data Management: 6th VLDB Workshop, SDM 2009, Lyon, France, August 28 …, 2009
62009
Exclusive strategy for generalization algorithms in micro-data disclosure
L Zhang, L Wang, S Jajodia, A Brodsky
Data and Applications Security XXII, 190-204, 2008
62008
Secret color images sharing schemes based on XOR operation
DS Wang, L Zhang, N Ma, LS Huang
Cryptology ePrint Archive, 2005
52005
Reverse tree-based key routing: Robust data aggregation in wireless sensor networks
L Zhang, H Zhang, M Conti, R Di Pietro, S Jajodia, LV Mancini
2010 10th IEEE International Conference on Computer and Information …, 2010
42010
Simulatable binding: beyond simulatable auditing
L Zhang, S Jajodia, A Brodsky
Secure Data Management: 5th VLDB Workshop, SDM 2008, Auckland, New Zealand …, 2008
42008
k-Jump strategy for preserving privacy in micro-data disclosure
WM Liu, L Wang, L Zhang
Proceedings of the 13th International Conference on Database Theory, 104-115, 2010
32010
A Framework for Maximizing Utility of Sanitized Documents Based on Meta-labeling
L Zhang, A Brodsky, V Swarup, S Jajodia
2008 IEEE Workshop on Policies for Distributed Systems and Networks, 181-188, 2008
32008
Evaluation based on invisible watermarking system
D Wang, J Liang, L Zhang, Y Dai
Multimedia Systems and Applications VI 5241, 202-210, 2003
32003
Restoring compromised privacy in micro-data disclosure
L Zhang, A Brodsky, S Jajodia
Proceedings of the 5th ACM Symposium on Information, Computer and …, 2010
12010
An Integrity Lock Architecture for Supporting Distributed Authorizations in Database Federations
W Li, L Wang, B Zhu, L Zhang
Proceedings of The Ifip Tc 11 23 rd International Information Security …, 2008
12008
k-jump: A strategy to design publicly-known algorithms for privacy preserving micro-data disclosure
WM Liu, L Wang, L Zhang, S Zhu
Journal of Computer Security 23 (2), 131-165, 2015
2015
Securing the information disclosure process
L Zhang
George Mason University, 2010
2010
Answering queries based on imprecision and uncertainty trade-offs in numeric databases
A Brodsky, L Zhang, S Jajodia
Workshop on Secure Data Management, 81-95, 2007
2007
系统目前无法执行此操作,请稍后再试。
文章 1–19