Cong Zuo
Cong Zuo
Email verificata su
Citata da
Citata da
A threshold anonymous authentication protocol for VANETs
J Shao, X Lin, R Lu, C Zuo
IEEE Transactions on vehicular technology 65 (3), 1711-1720, 2015
CCA-secure ABE with outsourced decryption for fog computing
C Zuo, J Shao, G Wei, M Xie, M Ji
Future Generation Computer Systems 78, 730-738, 2018
Result pattern hiding searchable encryption for conjunctive queries
S Lai, S Patranabis, A Sakzad, JK Liu, D Mukhopadhyay, R Steinfeld, ...
Proceedings of the 2018 ACM SIGSAC conference on computer and communicationsá…, 2018
Privacy-preserving COVID-19 contact tracing app: a zero-knowledge proof approach
JK Liu, MH Au, TH Yuen, C Zuo, J Wang, A Sakzad, X Luo, L Li, ...
Cryptology ePrint Archive, 2020
Dynamic searchable symmetric encryption schemes supporting range queries with forward (and backward) security
C Zuo, SF Sun, JK Liu, J Shao, J Pieprzyk
European Symposium on Research in Computer Security, 228-246, 2018
Fine-grained two-factor protection mechanism for data sharing in cloud storage
C Zuo, J Shao, JK Liu, G Wei, Y Ling
IEEE Transactions on Information Forensics and Security 13 (1), 186-196, 2017
Dynamic searchable symmetric encryption with forward and stronger backward privacy
C Zuo, SF Sun, JK Liu, J Shao, J Pieprzyk
European symposium on research in computer security, 283-303, 2019
Trusted boolean search on cloud using searchable symmetric encryption
C Zuo, J Macindoe, S Yang, R Steinfeld, JK Liu
2016 IEEE Trustcom/BigDataSE/ISPA, 113-120, 2016
Building a dynamic searchable encrypted medical database for multi-client
L Xu, C Xu, JK Liu, C Zuo, P Zhang
Information Sciences 527, 394-405, 2020
Forward and backward private DSSE for range queries
C Zuo, S Sun, JK Liu, J Shao, J Pieprzyk, L Xu
IEEE Transactions on Dependable and Secure Computing, 2020
Multi-client cloud-based symmetric searchable encryption
SK Kermanshahi, JK Liu, R Steinfeld, S Nepal, S Lai, R Loh, C Zuo
IEEE Transactions on Dependable and Secure Computing 18 (5), 2419-2437, 2019
Enabling authorized encrypted search for multi-authority medical databases
L Xu, S Sun, X Yuan, JK Liu, C Zuo, C Xu
IEEE Transactions on Emerging Topics in Computing 9 (1), 534-546, 2019
New threshold anonymous authentication for VANETs
J Shao, R Lu, X Lin, C Zuo
2015 IEEE/CIC International Conference on Communications in China (ICCC), 1-6, 2015
Non-interactive multi-client searchable encryption: realization and implementation
SF Sun, C Zuo, JK Liu, A Sakzad, R Steinfeld, TH Yuen, X Yuan, D Gu
IEEE Transactions on Dependable and Secure Computing, 2020
Chosen ciphertext secure attribute-based encryption with outsourced decryption
C Zuo, J Shao, G Wei, M Xie, M Ji
Australasian Conference on Information Security and Privacy, 495-508, 2016
IoT Services: Realizing Private Real-Time Detection via Authenticated Conjunctive Searchable Encryption
C Xu, M Lin, J Cheng, Y Zhao, C Zuo
Journal of Cybersecurity 3 (1), 55, 2021
Forward and backward private dynamic searchable symmetric encryption for conjunctive queries
C Zuo, SF Sun, JK Liu, J Shao, J Pieprzyk, G Wei
Cryptology ePrint Archive, 2020
Searchable encryption with access control on keywords in multi-user setting
L Li, C Xu, X Yu, B Dou, C Zuo
Journal of Cybersecurity 2 (1), 9, 2020
Efficient certificate-based signature and its aggregation
X Ma, J Shao, C Zuo, R Meng
International Conference on Information Security Practice and Experienceá…, 2017
Cost-effective privacy-preserving vehicular urban sensing system
C Zuo, K Liang, ZL Jiang, J Shao, J Fang
Personal and Ubiquitous Computing 21 (5), 893-901, 2017
Il sistema al momento non pu˛ eseguire l'operazione. Riprova pi¨ tardi.
Articoli 1–20