Publications
Search

Publications :: Search

Show author

On this page you see the details of the selected author.

    Author information
    First name: Mingwu
    Last name: Zhang
    DBLP: 28/2422
    Rating: (not rated yet)
    Bookmark:

    Below you find the publications which have been written by this author.

    Show item 1 to 25 of 78  
    Select a publication
    Show Title Venue Rating Date
    Conference paper
    Xu An Wang, Jianfeng Ma, Fatos Xhafa, Mingwu Zhang, Xiaoshuang Luo.
    Cost-effective secure E-health cloud system using identity based cryptographic techniques.
    Future Generation Comp. Syst. 2017, Volume 67 (0) 2017
    Conference paper
    Hua Shen, Mingwu Zhang, Jian Shen.
    Efficient Privacy-Preserving Cube-Data Aggregation Scheme for Smart Grids.
    IEEE Trans. Information Forensics and Security 2017, Volume 12 (0) 2017
    Conference paper
    Yonghui Chen, Mingwu Zhang, Chao Xu.
    Reliable Homomorphic Matrix Disguising Scheme.
    Innovative Mobile and Internet Services in Ubiquitous Computing - Proceedings of the 11th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS-2017), Torino, Italy, 10-12 July 2017. 2018 (0) 2017
    Conference paper
    Sujuan Li, Yi Mu, Mingwu Zhang, Futai Zhang.
    Continuous Leakage Resilient Lossy Trapdoor Functions.
    Information 2017, Volume 8 (0) 2017
    Conference paper
    Mingwu Zhang, Yudi Zhang, Yixin Su, Qiong Huang, Yi Mu.
    Attribute-Based Hash Proof System Under Learning-With-Errors Assumption in Obfuscator-Free and Leakage-Resilient Environments.
    IEEE Systems Journal 2017, Volume 11 (0) 2017
    Conference paper
    Mingwu Zhang, Yudi Zhang, Hua Shen, Chunming Tang, Lein Harn.
    Efficiently Obfuscating Anonymous Re-encryption Functionality with Average-Case Virtual Black-Box Security.
    J. Inf. Sci. Eng. 2017, Volume 33 (0) 2017
    Conference paper
    Xu An Wang, Jianfeng Ma, Fatos Xhafa, Baodong Qin, Mingwu Zhang.
    New efficient chosen ciphertext secure Elgamal encryption schemes for secure Cloud storage service.
    IJWGS 2017, Volume 13 (0) 2017
    Conference paper
    Ou Ruan, Mingwu Zhang, Jing Chen.
    Leakage-Resilient Password-Based Authenticated Key Exchange.
    Algorithms and Architectures for Parallel Processing - 17th International Conference, ICA3PP 2017, Helsinki, Finland, August 21-23, 2017, Proceedings 2017 (0) 2017
    Conference paper
    Yudi Zhang, Yan Jiang, Bingbing Li, Mingwu Zhang.
    An Efficient Identity-Based Homomorphic Signature Scheme for Network Coding.
    Advances in Internetworking, Data Web Technologies, The 5th International Conference on Emerging Internetworking, Data Web Technologies, EIDWT-2017, Wuhan, China, June 10-11, 2017. 2018 (0) 2017
    Conference paper
    Bo Yang 0003, Mingwu Zhang, Jun-Qiang Du.
    An error-tolerant keyword search scheme based on public-key encryption in secure cloud computing.
    Concurrency and Computation: Practice and Experience 2016, Volume 28 (0) 2016
    Journal article
    Ou Ruan, Jing Zhou, Mingwu Zhang.
    An efficient resource-fair commit-prove-fair-open protocol.
    IJESDF 2016, Volume 8 (0) 2016
    Conference paper
    Mingwu Zhang, Yi Mu.
    Token-Leakage Tolerant and Vector Obfuscated IPE and Application in Privacy-Preserving Two-Party Point/Polynomial Evaluations.
    Comput. J. 2016, Volume 59 (0) 2016
    Conference paper
    Rongmao Chen, Yi Mu, Willy Susilo, Guomin Yang, Fuchun Guo, Mingwu Zhang.
    One-Round Strong Oblivious Signature-Based Envelope.
    Information Security and Privacy - 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part II 2016 (0) 2016
    Conference paper
    Mingwu Zhang, Yong Xia, Ou Yuan, Kirill Morozov.
    Privacy-friendly weighted-reputation aggregation protocols against malicious adversaries in cloud services.
    Int. J. Communication Systems 2016, Volume 29 (0) 2016
    Conference paper
    Mingwu Zhang, Bo Yang 0003.
    Continual key leakage tolerant encryption from extensible set delegation.
    Security and Communication Networks 2016, Volume 9 (0) 2016
    Conference paper
    Mingwu Zhang, Yi Mu, Jian Shen, Xinyi Huang.
    Strongly average-case secure obfuscation: achieving input privacy and circuit obscurity.
    Security and Communication Networks 2016, Volume 9 (0) 2016
    Conference paper
    Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo, Mingwu Zhang.
    Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions.
    IACR Cryptology ePrint Archive 2016, Volume 2016 (0) 2016
    Conference paper
    Sujuan Li, Yi Mu, Mingwu Zhang, Futai Zhang.
    Updatable Lossy Trapdoor Functions and Its Application in Continuous Leakage.
    Provable Security - 10th International Conference, ProvSec 2016, Nanjing, China, November 10-11, 2016, Proceedings 2016 (0) 2016
    Conference paper
    Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo, Mingwu Zhang.
    Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions.
    Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part I 2016 (0) 2016
    Journal article
    Lein Harn, Ching-Fang Hsu, Mingwu Zhang, Tingting He, Maoyuan Zhang.
    Realizing secret sharing with general access structure.
    Inf. Sci. 2016, Volume 367 (0) 2016
    Journal article
    Chunhua Pan, Shunpeng Li, Qihui Zhu, Chunzhi Wang, Mingwu Zhang.
    Notes on Proxy Signcryption and Multi-proxy Signature Schemes.
    I. J. Network Security 2015, Volume 17 (0) 2015
    Conference paper
    Sha Ma, Qiong Huang, Mingwu Zhang, Bo Yang.
    Efficient Public Key Encryption With Equality Test Supporting Flexible Authorization.
    IEEE Transactions on Information Forensics and Security 2015, Volume 10 (0) 2015
    Conference paper
    Sha Ma, Mingwu Zhang, Qiong Huang, Bo Yang.
    Public Key Encryption with Delegated Equality Test in a Multi-User Setting.
    Comput. J. 2015, Volume 58 (0) 2015
    Conference paper
    Mingwu Zhang, Chunzhi Wang, Tsuyoshi Takagi, Yi Mu.
    Functional Encryption Resilient to Hard-to-Invert Leakage.
    Comput. J. 2015, Volume 58 (0) 2015
    Conference paper
    Debiao He, Mingwu Zhang, Baowen Xu.
    Insecurity of an Efficient Identity-Based Proxy Signature in the Standard Model.
    Comput. J. 2015, Volume 58 (0) 2015
    Show item 1 to 25 of 78  

    Your query returned 78 matches in the database.