Peng Zhang
Peng Zhang
Email verificata su
Citata da
Citata da
An efficient access control scheme with outsourcing capability and attribute update for fog computing
P Zhang, Z Chen, JK Liu, K Liang, H Liu
Future Generation Computer Systems 78, 753-762, 2018
A survey on access control in fog computing
P Zhang, JK Liu, FR Yu, M Sookhak, MH Au, X Luo
IEEE Communications Magazine 56 (2), 144-149, 2018
Private machine learning classification based on fully homomorphic encryption
X Sun, P Zhang, JK Liu, J Yu, W Xie
IEEE Transactions on Emerging Topics in Computing 8 (2), 352-364, 2018
A new blockchain-based value-added tax system
DA Wijaya, JK Liu, DA Suwarsono, P Zhang
International conference on provable security, 471-486, 2017
Time-based direct revocable ciphertext-policy attribute-based encryption with short revocation list
JK Liu, TH Yuen, P Zhang, K Liang
International Conference on Applied Cryptography and Network Security, 516-534, 2018
Efficient attribute-based encryption from R-LWE
W Zhu, J Yu, T Wang, P Zhang, W Xie
Chin. J. Electron 23 (4), 778-782, 2014
A cloud-based access control scheme with user revocation and attribute update
P Zhang, Z Chen, K Liang, S Wang, T Wang
Australasian Conference on Information Security and Privacy, 525-540, 2016
A survey on cyber-security of connected and autonomous vehicles (CAVs)
X Sun, FR Yu, P Zhang
IEEE Transactions on Intelligent Transportation Systems, 2021
A homomorphic aggregate signature scheme based on lattice
P Zhang, J Yu, T Wang
Chinese Journal of Electronics 21 (4), 701-704, 2012
Verifiable keyword search for secure big data-based mobile healthcare networks with fine-grained authorization control
Z Chen, F Zhang, P Zhang, JK Liu, J Huang, H Zhao, J Shen
Future Generation Computer Systems 87, 712-724, 2018
Dynamic data operations with deduplication in privacy-preserving public auditing for secure cloud storage
Y Wu, ZL Jiang, X Wang, SM Yiu, P Zhang
2017 IEEE International Conference on Computational Science and Engineering …, 2017
Research on the hash function structures and its application
Y Yang, X Zhang, J Yu, P Zhang
Wireless Personal Communications 94 (4), 2969-2985, 2017
Public data integrity verification for secure cloud storage
H Liu, P Zhang, J Liu
Journal of networks 8 (2), 373, 2013
Building a dynamic searchable encrypted medical database for multi-client
L Xu, C Xu, JK Liu, C Zuo, P Zhang
Information Sciences 527, 394-405, 2020
A survey on zero-knowledge proof in blockchain
X Sun, FR Yu, P Zhang, Z Sun, W Xie, X Peng
IEEE network 35 (4), 198-205, 2021
Utilizing fully homomorphic encryption to implement secure medical computation in smart cities
X Sun, P Zhang, M Sookhak, J Yu, W Xie
Personal and Ubiquitous Computing 21 (5), 831-839, 2017
Ciphertext policy attribute-based encryption supporting unbounded attribute space from R-LWE
Z Chen, P Zhang, F Zhang, J Huang
KSII Transactions on Internet and Information Systems (TIIS) 11 (4), 2292-2309, 2017
Secure and efficient multi-signature schemes for fabric: An enterprise blockchain platform
Y Xiao, P Zhang, Y Liu
IEEE Transactions on Information Forensics and Security 16, 1782-1794, 2020
Attribute-based encryption scheme supporting decryption outsourcing and attribute revocation in cloud storage
H Liu, P Zhu, Z Chen, P Zhang, ZL Jiang
2017 IEEE International Conference on Computational Science and Engineering …, 2017
Efficient identity‐based leveled fully homomorphic encryption from RLWE
X Sun, J Yu, T Wang, Z Sun, P Zhang
Security and communication networks 9 (18), 5155-5165, 2016
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20