Publications
Search

Publications :: Search

Show author

On this page you see the details of the selected author.

    Author information
    First name: Mingwu
    Last name: Zhang
    DBLP: 28/2422
    Rating: (not rated yet)
    Bookmark:

    Below you find the publications which have been written by this author.

    Show item 1 to 25 of 71  
    Select a publication
    Show Title Venue Rating Date
    Journal article
    Xu An Wang, Jianfeng Ma, Fatos Xhafa, Mingwu Zhang, Xiaoshuang Luo.
    Cost-effective secure E-health cloud system using identity based cryptographic techniques.
    Future Generation Comp. Syst. 2017, Volume 67 (0) 2017
    Conference paper
    Hua Shen, Mingwu Zhang, Jian Shen.
    Efficient Privacy-Preserving Cube-Data Aggregation Scheme for Smart Grids.
    IEEE Trans. Information Forensics and Security 2017, Volume 12 (0) 2017
    Conference paper
    Bo Yang 0003, Mingwu Zhang, Jun-Qiang Du.
    An error-tolerant keyword search scheme based on public-key encryption in secure cloud computing.
    Concurrency and Computation: Practice and Experience 2016, Volume 28 (0) 2016
    Journal article
    Ou Ruan, Jing Zhou, Mingwu Zhang.
    An efficient resource-fair commit-prove-fair-open protocol.
    IJESDF 2016, Volume 8 (0) 2016
    Conference paper
    Mingwu Zhang, Yi Mu.
    Token-Leakage Tolerant and Vector Obfuscated IPE and Application in Privacy-Preserving Two-Party Point/Polynomial Evaluations.
    Comput. J. 2016, Volume 59 (0) 2016
    Conference paper
    Rongmao Chen, Yi Mu, Willy Susilo, Guomin Yang, Fuchun Guo, Mingwu Zhang.
    One-Round Strong Oblivious Signature-Based Envelope.
    Information Security and Privacy - 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part II 2016 (0) 2016
    Conference paper
    Mingwu Zhang, Yong Xia, Ou Yuan, Kirill Morozov.
    Privacy-friendly weighted-reputation aggregation protocols against malicious adversaries in cloud services.
    Int. J. Communication Systems 2016, Volume 29 (0) 2016
    Conference paper
    Mingwu Zhang, Bo Yang 0003.
    Continual key leakage tolerant encryption from extensible set delegation.
    Security and Communication Networks 2016, Volume 9 (0) 2016
    Conference paper
    Mingwu Zhang, Yi Mu, Jian Shen, Xinyi Huang.
    Strongly average-case secure obfuscation: achieving input privacy and circuit obscurity.
    Security and Communication Networks 2016, Volume 9 (0) 2016
    Conference paper
    Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo, Mingwu Zhang.
    Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions.
    IACR Cryptology ePrint Archive 2016, Volume 2016 (0) 2016
    Conference paper
    Sujuan Li, Yi Mu, Mingwu Zhang, Futai Zhang.
    Updatable Lossy Trapdoor Functions and Its Application in Continuous Leakage.
    Provable Security - 10th International Conference, ProvSec 2016, Nanjing, China, November 10-11, 2016, Proceedings 2016 (0) 2016
    Conference paper
    Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo, Mingwu Zhang.
    Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions.
    Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part I 2016 (0) 2016
    Journal article
    Lein Harn, Ching-Fang Hsu, Mingwu Zhang, Tingting He, Maoyuan Zhang.
    Realizing secret sharing with general access structure.
    Inf. Sci. 2016, Volume 367 (0) 2016
    Journal article
    Chunhua Pan, Shunpeng Li, Qihui Zhu, Chunzhi Wang, Mingwu Zhang.
    Notes on Proxy Signcryption and Multi-proxy Signature Schemes.
    I. J. Network Security 2015, Volume 17 (0) 2015
    Conference paper
    Sha Ma, Qiong Huang, Mingwu Zhang, Bo Yang.
    Efficient Public Key Encryption With Equality Test Supporting Flexible Authorization.
    IEEE Transactions on Information Forensics and Security 2015, Volume 10 (0) 2015
    Conference paper
    Sha Ma, Mingwu Zhang, Qiong Huang, Bo Yang.
    Public Key Encryption with Delegated Equality Test in a Multi-User Setting.
    Comput. J. 2015, Volume 58 (0) 2015
    Conference paper
    Mingwu Zhang, Chunzhi Wang, Tsuyoshi Takagi, Yi Mu.
    Functional Encryption Resilient to Hard-to-Invert Leakage.
    Comput. J. 2015, Volume 58 (0) 2015
    Conference paper
    Debiao He, Mingwu Zhang, Baowen Xu.
    Insecurity of an Efficient Identity-Based Proxy Signature in the Standard Model.
    Comput. J. 2015, Volume 58 (0) 2015
    Conference paper
    Mingwu Zhang, Biwen Chen, Hua Shen.
    Program Obfuscator for Privacy-Carrying Unidirectional One-hop Re-encryption.
    Algorithms and Architectures for Parallel Processing - ICA3PP International Workshops and Symposiums, Zhangjiajie, China, November 18-20, 2015, Proceedings 2015 (0) 2015
    Conference paper
    Chi Cheng, Tao Jiang 0002, Yining Liu, Mingwu Zhang.
    Security analysis of a homomorphic signature scheme for network coding.
    Security and Communication Networks 2015, Volume 8 (0) 2015
    Journal article
    Zhenhua Chen, Shundong Li, Chunzhi Wang, Mingwu Zhang.
    Comments on FHH Anonymous Multireceiver Encryption.
    I. J. Network Security 2014, Volume 16 (0) 2014
    Journal article
    Min Zhou, Mingwu Zhang, Chunzhi Wang, Bo Yang 0003.
    CCLAS: A Practical and Compact Certificateless Aggregate Signature with Share Extraction.
    I. J. Network Security 2014, Volume 16 (0) 2014
    Conference paper
    Mingwu Zhang.
    ACP-lrFEM: Functional Encryption Mechanism with Automatic Control Policy in the Presence of Key Leakage.
    Information Security Practice and Experience - 10th International Conference, ISPEC 2014, Fuzhou, China, May 5-8, 2014. Proceedings 2014 (0) 2014
    Conference paper
    Mingwu Zhang, Yi Mu.
    Key continual-leakage resilient broadcast cryptosystem from dual system in broadcast networks.
    Frontiers of Computer Science 2014, Volume 8 (0) 2014
    Conference paper
    Mingwu Zhang.
    New Model and Construction of ABE: Achieving Key Resilient-Leakage and Attribute Direct-Revocation.
    Information Security and Privacy - 19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings 2014 (0) 2014
    Show item 1 to 25 of 71  

    Your query returned 71 matches in the database.