Publications :: Search

Show author

On this page you see the details of the selected author.

    Author information
    First name: Changlu
    Last name: Lin
    DBLP: 00/1114
    Rating: (not rated yet)

    Below you find the publications which have been written by this author.

    Show item 1 to 10 of 30  
    Select a publication
    Show Title Venue Rating Date
    Conference paper
    Yong Li 0002, Ge Yao, Huaqun Wang, Changlu Lin.
    Large Branching Tree Based Dynamic Provable Data Possession Scheme.
    J. Inf. Sci. Eng. 2017, Volume 33 (0) 2017
    Journal article
    Feng Wang, Chin-Chen Chang, Changlu Lin, Shih-Chang Chang.
    Secure and Efficient Identity-based Proxy Multi-signature Using Cubic Residues.
    I. J. Network Security 2016, Volume 18 (0) 2016
    Conference paper
    Feng Wang, Chin-Chen Chang, Changlu Lin.
    Security Analysis on Secure Untraceable Off-line Electronic Cash System.
    I. J. Network Security 2016, Volume 18 (0) 2016
    Conference paper
    Ge Yao, Yong Li 0002, Linan Lei, Huaqun Wang, Changlu Lin.
    An Efficient Dynamic Provable Data Possession Scheme in Cloud Storage.
    Green, Pervasive, and Cloud Computing - 11th International Conference, GPC 2016, Xi'an, China, May 6-8, 2016. Proceedings 2016 (0) 2016
    Conference paper
    Fucai Luo, Changlu Lin, Yan Zhu.
    Role-Based Signature and Its Security Proof.
    J. Inf. Sci. Eng. 2016, Volume 32 (0) 2016
    Conference paper
    Yining Liu, Wei Guo, Chi Cheng, Chingfang Hsu, Junyan Qian, Changlu Lin.
    A Robust Electronic Voting Scheme Against Side Channel Attack.
    J. Inf. Sci. Eng. 2016, Volume 32 (0) 2016
    Journal article
    Changlu Lin, Yong Li 0002, Kewei Lv, Chin-Chen Chang.
    Ciphertext-Auditable Identity-Based Encryption.
    I. J. Network Security 2015, Volume 17 (0) 2015
    Journal article
    Lein Harn, Changlu Lin, Yong Li 0002.
    Fair secret reconstruction in (t, n) secret sharing.
    J. Inf. Sec. Appl. 2015, Volume 23 (0) 2015
    Conference paper
    Changlu Lin, Fucai Luo, Huaxiong Wang, Yan Zhu.
    A Provable Data Possession Scheme with Data Hierarchy in Cloud.
    Information Security and Cryptology - 11th International Conference, Inscrypt 2015, Beijing, China, November 1-3, 2015, Revised Selected Papers 2016 (0) 2015
    Conference paper
    Changlu Lin, Fei Tang, Pinhui Ke, Lein Harn, Shengyuan Zhang.
    Secure universal designated verifier identity-based signcryption.
    Security and Communication Networks 2014, Volume 7 (0) 2014
    Show item 1 to 25 of 30  

    Your query returned 30 matches in the database.