Підписатись
xin li
xin li
Sinocloud Wisdom (Beijing) technology co., ltd
Підтверджена електронна адреса в yunkouan.com - Домашня сторінка
Назва
Посилання
Посилання
Рік
Deepchain: Auditable and privacy-preserving deep learning with blockchain-based incentive
J Weng, J Weng, J Zhang, M Li, Y Zhang, W Luo
IEEE Transactions on Dependable and Secure Computing 18 (5), 2438-2455, 2019
6812019
HASBE: A hierarchical attribute-based solution for flexible and scalable access control in cloud computing
Z Wan, RH Deng
IEEE transactions on information forensics and security 7 (2), 743-754, 2011
6732011
Attribute-based encryption with verifiable outsourced decryption
J Lai, RH Deng, C Guan, J Weng
IEEE Transactions on information forensics and security 8 (8), 1343-1354, 2013
5942013
CrowdBC: A blockchain-based decentralized framework for crowdsourcing
M Li, J Weng, A Yang, W Lu, Y Zhang, L Hou, JN Liu, Y Xiang, RH Deng
IEEE transactions on parallel and distributed systems 30 (6), 1251-1266, 2018
5792018
Security and privacy in smart health: Efficient policy-hiding attribute-based access control
Y Zhang, D Zheng, RH Deng
IEEE Internet of Things Journal 5 (3), 2130-2145, 2018
5072018
Efficient and practical fair exchange protocols with off-line TTP
F Bao, RH Deng, W Mao
Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No. 98CB36186 …, 1998
4951998
Key-aggregate cryptosystem for scalable data sharing in cloud storage
CK Chu, SSM Chow, WG Tzeng, J Zhou, RH Deng
IEEE transactions on parallel and distributed systems 25 (2), 468-477, 2013
4862013
Variations of diffie-hellman problem
F Bao, RH Deng, H Zhu
International conference on information and communications security, 301-312, 2003
4512003
Efficient unidirectional proxy re-encryption
SSM Chow, J Weng, Y Yang, RH Deng
International Conference on Cryptology in Africa, 316-332, 2010
4332010
ROPecker: A generic and practical approach for defending against ROP attack
Y Cheng, Z Zhou, Y Miao, X Ding, RH Deng
Internet Society, 2014
4022014
Feature selection for text classification: A review
X Deng, Y Li, J Weng, J Zhang
Multimedia Tools and Applications 78 (3), 3797-3816, 2019
3962019
Chosen-ciphertext secure proxy re-encryption without pairings
RH Deng, J Weng, S Liu, K Chen
International Conference on Cryptology and Network Security, 1-17, 2008
3652008
Trellis-coded multidimensional phase modulation
SS Pietrobon, RH Deng, A Lafanechere, G Ungerboeck, DJ Costello
IEEE Transactions on Information Theory 36 (1), 63-89, 1990
3531990
A signcryption scheme with signature directly verifiable by public key
F Bao, RH Deng
International workshop on public key cryptography, 55-59, 1998
3501998
Private query on encrypted data in multi-user settings
F Bao, RH Deng, X Ding, Y Yang
International Conference on Information Security Practice and Experience, 71-85, 2008
3362008
Verifiable computation over large database with incremental updates
X Chen, J Li, J Weng, J Ma, W Lou
IEEE transactions on Computers 65 (10), 3184-3195, 2015
3252015
Practical protocols for certified electronic mail
RH Deng, L Gong, AA Lazar, W Wang
Journal of network and systems management 4, 279-297, 1996
3231996
Anonymous secure routing in mobile ad-hoc networks
B Zhu, Z Wan, MS Kankanhalli, F Bao, RH Deng
29th annual IEEE international conference on local computer networks, 102-108, 2004
3162004
A generic framework for three-factor authentication: Preserving security and privacy in distributed systems
X Huang, Y Xiang, A Chonka, J Zhou, RH Deng
IEEE Transactions on Parallel and Distributed Systems 22 (8), 1390-1397, 2010
3062010
On the equivalence of McEliece's and Niederreiter's public-key cryptosystems
YX Li, RH Deng, XM Wang
IEEE Transactions on Information Theory 40 (1), 271-273, 1994
2901994
У даний момент система не може виконати операцію. Спробуйте пізніше.
Статті 1–20