关注
Peng Zhang
Peng Zhang
在 szu.edu.cn 的电子邮件经过验证
标题
引用次数
引用次数
年份
An efficient access control scheme with outsourcing capability and attribute update for fog computing
P Zhang, Z Chen, JK Liu, K Liang, H Liu
Future Generation Computer Systems 78, 753-762, 2018
1632018
A survey on access control in fog computing
P Zhang, JK Liu, FR Yu, M Sookhak, MH Au, X Luo
IEEE Communications Magazine 56 (2), 144-149, 2018
1222018
Private machine learning classification based on fully homomorphic encryption
X Sun, P Zhang, JK Liu, J Yu, W Xie
IEEE Transactions on Emerging Topics in Computing 8 (2), 352-364, 2018
1122018
A survey on cyber-security of connected and autonomous vehicles (CAVs)
X Sun, FR Yu, P Zhang
IEEE Transactions on Intelligent Transportation Systems, 2021
852021
A new blockchain-based value-added tax system
DA Wijaya, JK Liu, DA Suwarsono, P Zhang
International conference on provable security, 471-486, 2017
812017
Time-based direct revocable ciphertext-policy attribute-based encryption with short revocation list
JK Liu, TH Yuen, P Zhang, K Liang
International Conference on Applied Cryptography and Network Security, 516-534, 2018
772018
Efficient attribute-based encryption from R-LWE
W Zhu, J Yu, T Wang, P Zhang, W Xie
Chin. J. Electron 23 (4), 778-782, 2014
552014
A survey on zero-knowledge proof in blockchain
X Sun, FR Yu, P Zhang, Z Sun, W Xie, X Peng
IEEE network 35 (4), 198-205, 2021
512021
A cloud-based access control scheme with user revocation and attribute update
P Zhang, Z Chen, K Liang, S Wang, T Wang
Australasian Conference on Information Security and Privacy, 525-540, 2016
402016
Verifiable keyword search for secure big data-based mobile healthcare networks with fine-grained authorization control
Z Chen, F Zhang, P Zhang, JK Liu, J Huang, H Zhao, J Shen
Future Generation Computer Systems 87, 712-724, 2018
342018
Building a dynamic searchable encrypted medical database for multi-client
L Xu, C Xu, JK Liu, C Zuo, P Zhang
Information Sciences 527, 394-405, 2020
322020
A homomorphic aggregate signature scheme based on lattice
P Zhang, J Yu, T Wang
Chinese Journal of Electronics 21 (4), 701-704, 2012
322012
Research on the hash function structures and its application
Y Yang, X Zhang, J Yu, P Zhang
Wireless Personal Communications 94 (4), 2969-2985, 2017
292017
Public data integrity verification for secure cloud storage
H Liu, P Zhang, J Liu
Journal of networks 8 (2), 373, 2013
282013
Dynamic data operations with deduplication in privacy-preserving public auditing for secure cloud storage
Y Wu, ZL Jiang, X Wang, SM Yiu, P Zhang
2017 IEEE International Conference on Computational Science and Engineering …, 2017
272017
Utilizing fully homomorphic encryption to implement secure medical computation in smart cities
X Sun, P Zhang, M Sookhak, J Yu, W Xie
Personal and Ubiquitous Computing 21 (5), 831-839, 2017
252017
Ciphertext policy attribute-based encryption supporting unbounded attribute space from R-LWE
Z Chen, P Zhang, F Zhang, J Huang
KSII Transactions on Internet and Information Systems (TIIS) 11 (4), 2292-2309, 2017
222017
Secure and efficient multi-signature schemes for fabric: An enterprise blockchain platform
Y Xiao, P Zhang, Y Liu
IEEE Transactions on Information Forensics and Security 16, 1782-1794, 2020
202020
A survey on secure computation based on homomorphic encryption in vehicular ad hoc networks
X Sun, FR Yu, P Zhang, W Xie, X Peng
Sensors 20 (15), 4253, 2020
172020
A novel file hierarchy access control scheme using attribute-based encryption
SL Wang, JP Yu, P Zhang, P Wang
Applied Mechanics and Materials 701, 911-918, 2015
132015
系统目前无法执行此操作,请稍后再试。
文章 1–20