Seguir
Zengpeng Li
Título
Citado por
Citado por
Ano
Preserving data privacy via federated learning: Challenges and solutions
Z Li, V Sharma, SP Mohanty
IEEE Consumer Electronics Magazine 9 (3), 8-16, 2020
1182020
Towards achieving keyword search over dynamic encrypted cloud data with symmetric-key based verification
X Ge, J Yu, H Zhang, C Hu, Z Li, Z Qin, R Hao
IEEE Transactions on Dependable and Secure computing 18 (1), 490-504, 2019
1002019
Quantum-safe round-optimal password authentication for mobile devices
Z Li, D Wang, E Morais
IEEE transactions on dependable and secure computing 19 (3), 1885-1899, 2020
742020
Achieving one-round password-based authenticated key exchange over lattices
Z Li, D Wang
IEEE transactions on services computing 15 (1), 308-321, 2019
472019
Towards multi-hop homomorphic identity-based proxy re-encryption via branching program
Z Li, C Ma, D Wang
IEEE Access 5, 16214-16228, 2017
292017
Two-round PAKE protocol over lattices without NIZK
Z Li, D Wang
International Conference on Information Security and Cryptology, 138-159, 2018
252018
PriParkRec: Privacy-preserving decentralized parking recommendation service
Z Li, M Alazab, S Garg, MS Hossain
IEEE Transactions on Vehicular Technology 70 (5), 4037-4050, 2021
212021
Multi-key FHE for multi-bit messages
Z Li, C Ma, H Zhou
Science China. Information Sciences 61 (2), 029101, 2018
182018
Achieving multi-hop PRE via branching program
Z Li, C Ma, D Wang
IEEE Transactions on Cloud Computing 8 (1), 45-58, 2017
182017
Preventing adaptive key recovery attacks on the GSW levelled homomorphic encryption scheme
Z Li, SD Galbraith, C Ma
Provable Security: 10th International Conference, ProvSec 2016, Nanjing …, 2016
182016
Building low-interactivity multifactor authenticated key exchange for industrial internet of things
Z Li, Z Yang, P Szalachowski, J Zhou
IEEE Internet of Things Journal 8 (2), 844-859, 2020
172020
Ciphertext-policy attribute-based proxy re-encryption via constrained PRFs
Z Li, V Sharma, C Ma, C Ge, W Susilo
Science China. Information Sciences 64 (6), 169301, 2021
152021
Oblivious transfer via lossy encryption from lattice-based cryptography
Z Li, C Xiang, C Wang
Wireless Communications and Mobile Computing 2018, 2018
152018
Leakage Resilient Leveled on Multiple Bits Message
Z Li, C Ma, D Wang
IEEE Transactions on Big Data 7 (5), 845-858, 2017
142017
Multi-bit Leveled Homomorphic Encryption via-Based
Z Li, C Ma, E Morais, G Du
International conference on information security and cryptology, 221-242, 2016
142016
Biometrics-authenticated key exchange for secure messaging
M Wang, K He, J Chen, Z Li, W Zhao, R Du
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
112021
Secdedup: Secure encrypted data deduplication with dynamic ownership updating
S Zhang, H Xian, Z Li, L Wang
IEEE Access 8, 186323-186334, 2020
112020
Overview on fully homomorphic encryption
Z LI, C MA, H ZHOU
Journal of Cryptologic Research 4 (6), 561-578, 2017
112017
PANDA: Lightweight non-interactive privacy-preserving data aggregation for constrained devices
M Wang, K He, J Chen, R Du, B Zhang, Z Li
Future Generation Computer Systems 131, 28-42, 2022
102022
Revisiting post-quantum hash proof systems over lattices for Internet of Thing authentications
Z Li, J Wang, W Zhang
Journal of Ambient Intelligence and Humanized Computing 11 (8), 3337-3347, 2020
102020
O sistema não pode efectuar a operação agora. Tente mais tarde.
Artigos 1–20