hong zhong
hong zhong
Email verificata su ahu.edu.cn
Citata da
Citata da
SPACF: A secure privacy-preserving authentication scheme for VANET with cuckoo filter
J Cui, J Zhang, H Zhong, Y Xu
IEEE Transactions on Vehicular Technology 66 (11), 10283-10295, 2017
Multi-party quantum key agreement with bell states and bell measurements
RH Shi, H Zhong
Quantum information processing 12 (2), 921-932, 2013
Multi-authority attribute-based encryption access control scheme with policy hidden for cloud storage
H Zhong, W Zhu, Y Xu, J Cui
Soft Computing 22 (1), 243-251, 2018
PA-CRT: Chinese remainder theorem based conditional privacy-preserving authentication scheme in vehicular ad-hoc networks
J Zhang, J Cui, H Zhong, Z Chen, L Liu
IEEE Transactions on Dependable and Secure Computing, 2019
An efficient message-authentication scheme based on edge computing for vehicular ad hoc networks
J Cui, L Wei, J Zhang, Y Xu, H Zhong
IEEE Transactions on Intelligent Transportation Systems 20 (5), 1621-1632, 2018
An efficient certificateless aggregate signature without pairings for vehicular ad hoc networks
J Cui, J Zhang, H Zhong, R Shi, Y Xu
Information Sciences 451, 1-15, 2018
Reprint of “LBBSRT: An efficient SDN load balancing scheme based on server response time”
H Zhong, Y Fang, J Cui
Future Generation Computer Systems 80, 409-416, 2018
An improved AES S-box and its performance analysis
J Cui, L Huang, H Zhong, C Chang, W Yang
International Journal of Innovative Computing, Information and Control 7 (5 …, 2011
Efficient conditional privacy-preserving and authentication scheme for secure service provision in VANET
H Zhong, J Wen, J Cui, S Zhang
Tsinghua Science and Technology 21 (6), 620-629, 2016
Multiparty quantum secret sharing with Bell states and Bell measurements
R Shi, L Huang, W Yang, H Zhong
Optics communications 283 (11), 2476-2480, 2010
Firework: Big data sharing and processing in collaborative edge environment
Q Zhang, X Zhang, Q Zhang, W Shi, H Zhong
2016 Fourth IEEE Workshop on Hot Topics in Web Systems and Technologies …, 2016
Secure two-party point-circle inclusion problem
YL Luo, LS Huang, H Zhong
Journal of Computer Science and Technology 22 (1), 88-91, 2007
AKSER: Attribute-based keyword search with efficient revocation in cloud computing
J Cui, H Zhou, H Zhong, Y Xu
Information Sciences 423, 343-352, 2018
Secure multiparty quantum computation for summation and multiplication
R Shi, Y Mu, H Zhong, J Cui, S Zhang
Scientific reports 6 (1), 1-9, 2016
Multi-party quantum state sharing of an arbitrary two-qubit state with Bell states
R Shi, L Huang, W Yang, H Zhong
Quantum Information Processing 10 (2), 231-239, 2011
Yu Han
Q Zhang, H Pan, J Wang, Z Tangchun
Conditional privacy-preserving authentication using registration list in vehicular ad hoc networks
H Zhong, B Huang, J Cui, Y Xu, L Liu
IEEE Access 6, 2241-2250, 2017
Firework: Data processing and sharing for hybrid cloud-edge analytics
Q Zhang, Q Zhang, W Shi, H Zhong
IEEE Transactions on Parallel and Distributed Systems 29 (9), 2004-2017, 2018
ECPB: efficient conditional privacy-preserving authentication scheme supporting batch verification for VANETs.
Y Wang, H Zhong, Y Xu, J Cui
IJ Network Security 18 (2), 374-382, 2016
A load-balancing mechanism for distributed SDN control plane using response time
J Cui, Q Lu, H Zhong, M Tian, L Liu
IEEE transactions on network and service management 15 (4), 1197-1206, 2018
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20