Huafei Zhu
Huafei Zhu
Zweryfikowany adres z ihpc.a-star.edu.sg
Cytowane przez
Cytowane przez
Variations of diffie-hellman problem
F Bao, RH Deng, H Zhu
International conference on information and communications security, 301-312, 2003
Private data deduplication protocols in cloud storage
WK Ng, Y Wen, H Zhu
Proceedings of the 27th Annual ACM Symposium on Applied Computing, 441-446, 2012
Deniable authentication protocols
X Deng, CH Lee, H Zhu
IEE Proceedings-Computers and Digital Techniques 148 (2), 101-104, 2001
Analysis and improvement of Micali’s fair contract signing protocol
F Bao, G Wang, J Zhou, H Zhu
Australasian Conference on Information Security and Privacy, 176-187, 2004
Computing of trust in wireless networks
H Zhu, F Bao, RH Deng
IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. 2004 4, 2621-2624, 2004
A novel two-level trust model for grid
TY Li, H Zhu, KY Lam
International Conference on Information and Communications Security, 214-225, 2003
New digital signature scheme attaining immunity to adaptive chosen message attack
HF Zhu
Chinese Journal of Electronics 10 (4), 484-486, 2001
Stand-alone and setup-free verifiably committed signatures
H Zhu, F Bao
Cryptographers’ Track at the RSA Conference, 159-173, 2006
Design and security analysis of anonymous group identification protocols
CH Lee, X Deng, H Zhu
International Workshop on Public Key Cryptography, 188-198, 2002
Computing of trust in distributed networks
H Zhu, B Feng, RH Deng
Cryptology ePrint Archive, 2003
Compact sequential aggregate signatures
Y Mu, W Susilo, H Zhu
Proceedings of the 2007 ACM symposium on Applied computing, 249-253, 2007
Multi-party stand-alone and setup-free verifiably committed signatures
H Zhu, W Susilo, Y Mu
International Workshop on Public Key Cryptography, 134-149, 2007
Cloud-enabled data sharing model
NT Hung, NW Keong, H Zhu
2012 IEEE International Conference on Intelligence and Security Informatics, 1-6, 2012
Sequential aggregate signatures for wireless routing protocols
H Zhu, F Bao, T Li, Y Wu
IEEE Wireless Communications and Networking Conference, 2005 4, 2436-2439, 2005
Augmented oblivious polynomial evaluation protocol and its applications
H Zhu, F Bao
European Symposium on Research in Computer Security, 222-230, 2005
Privacy-preserving weighted federated learning within the secret sharing framework
H Zhu, RSM Goh, WK Ng
IEEE Access 8, 198275-198284, 2020
Efficient group signatures from bilinear pairing
X Cheng, H Zhu, Y Qiu, X Wang
International Conference on Information Security and Cryptology, 128-139, 2005
Flexible verification of MPEG-4 stream in peer-to-peer CDN
T Li, Y Wu, D Ma, H Zhu, RH Deng
International Conference on Information and Communications Security, 79-91, 2004
An efficient scheme for encrypted data aggregation on sensor networks
T Li, Y Wu, H Zhu
2006 IEEE 63rd Vehicular Technology Conference 2, 831-835, 2006
Somewhat secure mobile electronic-voting systems based on the cut-and-choose mechanism
Y Qiu, H Zhu
2009 International Conference on Computational Intelligence and Security 1 …, 2009
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20