Publications
Search

Publications :: Search

Show author

On this page you see the details of the selected author.

    Author information
    First name: Mingwu
    Last name: Zhang
    DBLP: 28/2422
    Rating: (not rated yet)
    Bookmark:

    Below you find the publications which have been written by this author.

    Show item 1 to 70 of 70  
    Select a publication
    Show Title Venue Rating Date
    Journal article
    Xu An Wang, Jianfeng Ma, Fatos Xhafa, Mingwu Zhang, Xiaoshuang Luo.
    Cost-effective secure E-health cloud system using identity based cryptographic techniques.
    Future Generation Comp. Syst. 2017, Volume 67 (0) 2017
    Conference paper
    Bo Yang 0003, Mingwu Zhang, Jun-Qiang Du.
    An error-tolerant keyword search scheme based on public-key encryption in secure cloud computing.
    Concurrency and Computation: Practice and Experience 2016, Volume 28 (0) 2016
    Journal article
    Ou Ruan, Jing Zhou, Mingwu Zhang.
    An efficient resource-fair commit-prove-fair-open protocol.
    IJESDF 2016, Volume 8 (0) 2016
    Conference paper
    Mingwu Zhang, Yi Mu.
    Token-Leakage Tolerant and Vector Obfuscated IPE and Application in Privacy-Preserving Two-Party Point/Polynomial Evaluations.
    Comput. J. 2016, Volume 59 (0) 2016
    Conference paper
    Rongmao Chen, Yi Mu, Willy Susilo, Guomin Yang, Fuchun Guo, Mingwu Zhang.
    One-Round Strong Oblivious Signature-Based Envelope.
    Information Security and Privacy - 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part II 2016 (0) 2016
    Conference paper
    Mingwu Zhang, Yong Xia, Ou Yuan, Kirill Morozov.
    Privacy-friendly weighted-reputation aggregation protocols against malicious adversaries in cloud services.
    Int. J. Communication Systems 2016, Volume 29 (0) 2016
    Conference paper
    Mingwu Zhang, Bo Yang 0003.
    Continual key leakage tolerant encryption from extensible set delegation.
    Security and Communication Networks 2016, Volume 9 (0) 2016
    Conference paper
    Mingwu Zhang, Yi Mu, Jian Shen, Xinyi Huang.
    Strongly average-case secure obfuscation: achieving input privacy and circuit obscurity.
    Security and Communication Networks 2016, Volume 9 (0) 2016
    Conference paper
    Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo, Mingwu Zhang.
    Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions.
    IACR Cryptology ePrint Archive 2016, Volume 2016 (0) 2016
    Conference paper
    Sujuan Li, Yi Mu, Mingwu Zhang, Futai Zhang.
    Updatable Lossy Trapdoor Functions and Its Application in Continuous Leakage.
    Provable Security - 10th International Conference, ProvSec 2016, Nanjing, China, November 10-11, 2016, Proceedings 2016 (0) 2016
    Conference paper
    Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo, Mingwu Zhang.
    Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions.
    Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part I 2016 (0) 2016
    Journal article
    Lein Harn, Ching-Fang Hsu, Mingwu Zhang, Tingting He, Maoyuan Zhang.
    Realizing secret sharing with general access structure.
    Inf. Sci. 2016, Volume 367 (0) 2016
    Journal article
    Chunhua Pan, Shunpeng Li, Qihui Zhu, Chunzhi Wang, Mingwu Zhang.
    Notes on Proxy Signcryption and Multi-proxy Signature Schemes.
    I. J. Network Security 2015, Volume 17 (0) 2015
    Conference paper
    Sha Ma, Qiong Huang, Mingwu Zhang, Bo Yang.
    Efficient Public Key Encryption With Equality Test Supporting Flexible Authorization.
    IEEE Transactions on Information Forensics and Security 2015, Volume 10 (0) 2015
    Conference paper
    Sha Ma, Mingwu Zhang, Qiong Huang, Bo Yang.
    Public Key Encryption with Delegated Equality Test in a Multi-User Setting.
    Comput. J. 2015, Volume 58 (0) 2015
    Conference paper
    Mingwu Zhang, Chunzhi Wang, Tsuyoshi Takagi, Yi Mu.
    Functional Encryption Resilient to Hard-to-Invert Leakage.
    Comput. J. 2015, Volume 58 (0) 2015
    Conference paper
    Debiao He, Mingwu Zhang, Baowen Xu.
    Insecurity of an Efficient Identity-Based Proxy Signature in the Standard Model.
    Comput. J. 2015, Volume 58 (0) 2015
    Conference paper
    Mingwu Zhang, Biwen Chen, Hua Shen.
    Program Obfuscator for Privacy-Carrying Unidirectional One-hop Re-encryption.
    Algorithms and Architectures for Parallel Processing - ICA3PP International Workshops and Symposiums, Zhangjiajie, China, November 18-20, 2015, Proceedings 2015 (0) 2015
    Conference paper
    Chi Cheng, Tao Jiang 0002, Yining Liu, Mingwu Zhang.
    Security analysis of a homomorphic signature scheme for network coding.
    Security and Communication Networks 2015, Volume 8 (0) 2015
    Journal article
    Zhenhua Chen, Shundong Li, Chunzhi Wang, Mingwu Zhang.
    Comments on FHH Anonymous Multireceiver Encryption.
    I. J. Network Security 2014, Volume 16 (0) 2014
    Journal article
    Min Zhou, Mingwu Zhang, Chunzhi Wang, Bo Yang 0003.
    CCLAS: A Practical and Compact Certificateless Aggregate Signature with Share Extraction.
    I. J. Network Security 2014, Volume 16 (0) 2014
    Conference paper
    Mingwu Zhang.
    ACP-lrFEM: Functional Encryption Mechanism with Automatic Control Policy in the Presence of Key Leakage.
    Information Security Practice and Experience - 10th International Conference, ISPEC 2014, Fuzhou, China, May 5-8, 2014. Proceedings 2014 (0) 2014
    Conference paper
    Mingwu Zhang, Yi Mu.
    Key continual-leakage resilient broadcast cryptosystem from dual system in broadcast networks.
    Frontiers of Computer Science 2014, Volume 8 (0) 2014
    Conference paper
    Mingwu Zhang.
    New Model and Construction of ABE: Achieving Key Resilient-Leakage and Attribute Direct-Revocation.
    Information Security and Privacy - 19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings 2014 (0) 2014
    Conference paper
    Zhenhua Chen, Shundong Li, Chunzhi Wang, Mingwu Zhang.
    Comments on FHH Anonymous Multireceiver Encryption.
    I. J. Network Security 2014, Volume 16 (0) 2014
    Conference paper
    Sha Ma, Bo Yang, Mingwu Zhang.
    PPGJ: A privacy-preserving general join for outsourced encrypted database.
    Security and Communication Networks 2014, Volume 7 (0) 2014
    Conference paper
    Ou Ruan, Jing Chen, Jing Zhou, Yongquan Cui, Mingwu Zhang.
    An efficient fair UC-secure protocol for two-party computation.
    Security and Communication Networks 2014, Volume 7 (0) 2014
    Conference paper
    Mingwu Zhang, Takashi Nishide, Bo Yang, Tsuyoshi Takagi.
    Anonymous encryption with partial-order subset delegation and its application in privacy email systems.
    IET Information Security 2014, Volume 8 (0) 2014
    Conference paper
    Mingwu Zhang, Chunzhi Wang, Kirill Morozov.
    LR-FEAD: leakage-tolerating and attribute-hiding functional encryption mechanism with delegation in affine subspaces.
    The Journal of Supercomputing 2014, Volume 70 (0) 2014
    Conference paper
    Mingwu Zhang, Bo Yang 0003, Chunzhi Wang, Tsuyoshi Takagi.
    Unbounded anonymous hierarchical IBE with continual-key-leakage tolerance.
    Security and Communication Networks 2014, Volume 7 (0) 2014
    Conference paper
    Mingwu Zhang, Bo Yang, Tsuyoshi Takagi.
    Anonymous spatial encryption under affine space delegation functionality with full security.
    Inf. Sci. 2014, Volume 277 (0) 2014
    Conference paper
    Mingwu Zhang, Chunzhi Wang, Bo Yang, Tsuyoshi Takagi.
    Fully secure constructions of spatial encryption with vector privacy.
    Int. J. Communication Systems 2014, Volume 27 (0) 2014
    Conference paper
    Mingwu Zhang, Bo Yang 0003, Tsuyoshi Takagi.
    Bounded Leakage-Resilient Functional Encryption with Hidden Vector Predicate.
    Comput. J. 2013, Volume 56 (0) 2013
    Conference paper
    Mingwu Zhang, Wei Shi, Chunzhi Wang, Zhenhua Chen, Yi Mu.
    Leakage-resilient Attribute-based Encryptions with Fast Decryption: Model, Analysis and Construction.
    IACR Cryptology ePrint Archive 2013, Volume 2013 (0) 2013
    Conference paper
    Mingwu Zhang, Wei Shi, Chunzhi Wang, Zhenhua Chen, Yi Mu.
    Leakage-Resilient Attribute-Based Encryption with Fast Decryption: Models, Analysis and Constructions.
    Information Security Practice and Experience - 9th International Conference, ISPEC 2013, Lanzhou, China, May 12-14, 2013. Proceedings 2013 (0) 2013
    Journal article
    Fagen Li, Mingwu Zhang, Tsuyoshi Takagi.
    Identity-based partially blind signature in the standard model for electronic cash.
    Mathematical and Computer Modelling 2013, Volume 58 (0) 2013
    Conference paper
    Mingwu Zhang, Tsuyoshi Takagi.
    Efficient Constructions of Anonymous Multireceiver Encryption Protocol and Their Deployment in Group E-mail Systems With Privacy Preservation.
    IEEE Systems Journal 2013, Volume 7 (0) 2013
    Conference paper
    Mingwu Zhang, Bo Yang 0003, Zhenhua Chen, Tsuyoshi Takagi.
    Efficient and adaptively secure broadcast encryption systems.
    Security and Communication Networks 2013, Volume 6 (0) 2013
    Journal article
    Mingwu Zhang, Jintao Yao, Chunzhi Wang, Tsuyoshi Takagi.
    Public Key Replacement and Universal Forgery of a SCLS Scheme.
    I. J. Network Security 2013, Volume 15 (0) 2013
    Journal article
    Mingwu Zhang, Tsuyoshi Takagi, Bo Yang, Fagen Li.
    Cryptanalysis of Strong Designated Verifier Signature Scheme with Non-delegatability and Non-transferability.
    IEICE Transactions 2012, Volume 95 (0) 2012
    Conference paper
    Mingwu Zhang, Fagen Li, Tsuyoshi Takagi.
    Analysis and Improvement of a Secret Broadcast with Binding Encryption in Broadcasting Networks.
    IEICE Transactions 2012, Volume 95 (0) 2012
    Journal article
    Youwen Zhu, Liusheng Huang, Tsuyoshi Takagi, Mingwu Zhang.
    Privacy-Preserving OLAP for Accurate Answer.
    Journal of Circuits, Systems, and Computers 2012, Volume 21 (0) 2012
    Conference paper
    Bo Yang 0003, Mingwu Zhang.
    LR-UESDE: A Continual-Leakage Resilient Encryption with Unbounded Extensible Set Delegation.
    Provable Security - 6th International Conference, ProvSec 2012, Chengdu, China, September 26-28, 2012. Proceedings 2012 (0) 2012
    Conference paper
    Chandrashekhar Meshram, Suchitra A. Meshram, Mingwu Zhang.
    An ID-based cryptographic mechanisms based on GDLP and IFP.
    Inf. Process. Lett. 2012, Volume 112 (0) 2012
    Conference paper
    Fagen Li, Mingwu Zhang, Tsuyoshi Takagi.
    Efficient signcryption in the standard model.
    Concurrency and Computation: Practice and Experience 2012, Volume 24 (0) 2012
    Conference paper
    Yuyue Xu, Jiulin Sun, Jinqu Zhang, Yong Xu, Mingwu Zhang, Xiuying Liao.
    Combining AHP with GIS in synthetic evaluation of environmental suitability for living in China's 35 major cities.
    International Journal of Geographical Information Science 2012, Volume 26 (0) 2012
    Conference paper
    Mingwu Zhang, Bo Yang 0003, Tsuyoshi Takagi.
    Reconciling and improving of multi-receiver signcryption protocols with threshold decryption.
    Security and Communication Networks 2012, Volume 5 (0) 2012
    Conference paper
    Jintao Yao, Kangshun Li, Mingwu Zhang, Min Zhou.
    A Robust Fuzzy Extractor without ECCs.
    Information Security and Cryptology - 8th International Conference, Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected Papers 2013 (0) 2012
    Journal article
    Mingwu Zhang, Bo Yang, Yusheng Zhong, Pengcheng Li, Tsuyoshi Takagi.
    Cryptanalysis and Fixed of Short Signature Scheme without Random Oracle from Bilinear Parings.
    I. J. Network Security 2011, Volume 12 (0) 2011
    Journal article
    Mingwu Zhang, Bo Yang, Wenzheng Zhang, Tsuyoshi Takagi.
    Multibiometric Based Secure Encryption, Authentication Scheme with Fuzzy Extractor.
    I. J. Network Security 2011, Volume 12 (0) 2011
    Conference paper
    Mingwu Zhang, Tsuyoshi Takagi, Bo Yang.
    Dual-Verifiers DVS with Message Recovery for Tolerant Routing in Wireless Sensor Networks.
    Intelligence and Security Informatics - Pacific Asia Workshop, PAISI 2011, Beijing, China, July 9, 2011. Proceedings 2011 (0) 2011
    Conference paper
    Mingwu Zhang, Tsuyoshi Takagi.
    GeoEnc: Geometric Area Based Keys and Policies in Functional Encryption Systems.
    Information Security and Privacy - 16th Australasian Conference, ACISP 2011, Melbourne, Australia, July 11-13, 2011. Proceedings 2011 (0) 2011
    Conference paper
    Mingwu Zhang, Bo Yang, Tsuyoshi Takagi.
    Group-oriented setting's multisigncryption scheme with threshold designcryption.
    Inf. Sci. 2011, Volume 181 (0) 2011
    Conference paper
    Mingwu Zhang, Takashi Nishide, Bo Yang, Tsuyoshi Takagi.
    Anonymous Encryption with Partial-Order Subset Delegation Functionality.
    Provable Security - 5th International Conference, ProvSec 2011, Xi'an, China, October 16-18, 2011. Proceedings 2011 (0) 2011
    Conference paper
    Fagen Li, Fahad Bin Muhaya, Mingwu Zhang, Tsuyoshi Takagi.
    Efficient Identity-Based Signcryption in the Standard Model.
    Provable Security - 5th International Conference, ProvSec 2011, Xi'an, China, October 16-18, 2011. Proceedings 2011 (0) 2011
    Conference paper
    Mingwu Zhang, Pengcheng Li, Bo Yang, Hao Wang, Tsuyoshi Takagi.
    Towards Confidentiality of ID-Based Signcryption Schemes under without Random Oracle Model.
    Intelligence and Security Informatics, Pacific Asia Workshop, PAISI 2010, Hyderabad, India, June 21, 2010. Proceedings 2010 (0) 2010
    Conference paper
    Mingwu Zhang, Bo Yang, Tsuyoshi Takagi, Yanping Shen, Wenzheng Zhang.
    Fuzzy Biometric Signcryption Scheme with Bilinear Pairings in the Standard Model.
    Intelligence and Security Informatics, Pacific Asia Workshop, PAISI 2010, Hyderabad, India, June 21, 2010. Proceedings 2010 (0) 2010
    Journal article
    Yajun Jiang, Bo Yang, Mingwu Zhang.
    A Classified Credential Selection Scheme with Disclosure-minimizing Privacy.
    JDCTA 2010, Volume 4 (0) 2010
    Journal article
    Mingwu Zhang, Tsuyoshi Takagi, Bo Yang.
    On the Public Key Replacement and Universal Forgery Attacks of Short Certificateless Signature.
    IACR Cryptology ePrint Archive 2010, Volume 2010 (0) 2010
    Journal article
    Mingwu Zhang, Yusheng Zhong, Pengcheng Li, Bo Yang.
    Analysis and Enhance of Anonymous Signcryption Scheme.
    IACR Cryptology ePrint Archive 2009, Volume 2009 (0) 2009
    Conference paper
    Mingwu Zhang, Yusheng Zhong, Bo Yang, Wenzheng Zhang.
    Analysis and Improvement of an ID-Based Anonymous Signcryption Model.
    Emerging Intelligent Computing Technology and Applications, 5th International Conference on Intelligent Computing, ICIC 2009, Ulsan, South Korea, September 16-19, 2009. Proceedings 2009 (0) 2009
    Conference paper
    Mingwu Zhang, Bo Yang, Shenglin Zhu, Wenzheng Zhang.
    Ordered Semiring-based Trust Establish Model with Risk Evaluating.
    I. J. Network Security 2009, Volume 8 (0) 2009
    Conference paper
    Mingwu Zhang, Qi Ouyang, Alan Stephenson, Michael D. Kane, David E. Salt, Sunil Prabhakar, John Burgner, Charles R. Buck, Xiang Zhang.
    Interactive analysis of systems biology molecular expression data.
    BMC Systems Biology 2008, Volume 2 (0) 2008
    Conference paper
    Mingwu Zhang, Bo Yang, Shenglin Zhu, Wenzheng Zhang.
    Assertions Signcryption Scheme in Decentralized Autonomous Trust Environments.
    Autonomic and Trusted Computing, 5th International Conference, ATC 2008, Oslo, Norway, June 23-25, 2008, Proceedings 2008 (0) 2008
    Conference paper
    Mingwu Zhang, Bo Yang, Shenglin Zhu, Wenzheng Zhang.
    Efficient Secret Authenticatable Anonymous Signcryption Scheme with Identity Privacy.
    Intelligence and Security Informatics, IEEE ISI 2008 International Workshops: PAISI, PACCF, and SOCO 2008, Taipei, Taiwan, June 17, 2008. Proceedings 2008 (0) 2008
    Conference paper
    Yong Yu, Bo Yang, Xinyi Huang, Mingwu Zhang.
    Efficient Identity-Based Signcryption Scheme for Multiple Receivers.
    Autonomic and Trusted Computing, 4th International Conference, ATC 2007, Hong Kong, China, July 11-13, 2007, Proceedings 2007 (0) 2007
    Conference paper
    Mingwu Zhang, Daisuke Kihara, Sunil Prabhakar.
    Tracing Lineage in Multi-version Scientific Databases.
    Proceedings of the 7th IEEE International Conference on Bioinformatics and Bioengineering, BIBE 2007, October 14-17, 2007, Harvard Medical School, Boston, MA, USA 2007 (0) 2007
    Conference paper
    Mingwu Zhang, Wei Jiang, Chris Clifton, Sunil Prabhakar.
    Identifying Rare Classes with Sparse Training Data.
    Database and Expert Systems Applications, 18th International Conference, DEXA 2007, Regensburg, Germany, September 3-7, 2007, Proceedings 2007 (0) 2007
    Conference paper
    Mingwu Zhang, Bo Yang, Yu Qi, Wenzheng Zhang.
    Using Trust Metric to Detect Malicious Behaviors in WSNs.
    Proceedings of the 8th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2007, July 30 - August 1, 2007, Qingdao, China 2007 (0) 2007
    Conference paper
    Mingwu Zhang, Xiangyu Zhang, Xiang Zhang, Sunil Prabhakar.
    Tracing Lineage Beyond Relational Operators.
    Proceedings of the 33rd International Conference on Very Large Data Bases, University of Vienna, Austria, September 23-27, 2007 2007 (0) 2007
    Show item 1 to 70 of 70  

    Your query returned 70 matches in the database.