Follow
Zhenfu Cao
Zhenfu Cao
Professor of School of Computer Science and Software Engineering, East China Normal University
Verified email at sei.ecnu.edu.cn - Homepage
Title
Cited by
Cited by
Year
Security and privacy for storage and computation in cloud computing
L Wei, H Zhu, Z Cao, X Dong, W Jia, Y Chen, AV Vasilakos
Information sciences 258, 371-386, 2014
6612014
Security and privacy for cloud-based IoT: Challenges
J Zhou, Z Cao, X Dong, AV Vasilakos
IEEE Communications Magazine 55 (1), 26-33, 2017
5802017
CCA-secure proxy re-encryption without pairings
J Shao, Z Cao
International Workshop on Public Key Cryptography, 357-376, 2009
4162009
信息安全综述
沈昌祥, 张焕国, 冯登国, 曹珍富, 黄继武
中国科学: E 辑 37 (002), 129-150, 2007
3272007
Attribute based proxy re-encryption with delegating capabilities
X Liang, Z Cao, H Lin, J Shao
Proceedings of the 4th International Symposium on Information, Computer, and …, 2009
3192009
丢番图方程引论
珍富
哈尔滨工业大学出版社, 1989
2631989
White-box traceable ciphertext-policy attribute-based encryption supporting any monotone access structures
Z Liu, Z Cao, DS Wong
IEEE Transactions on Information Forensics and Security 8 (1), 76-88, 2012
2132012
Simple three-party key exchange protocol
R Lu, Z Cao
Computers & Security 26 (1), 94-97, 2007
2112007
A probabilistic misbehavior detection scheme toward efficient trust establishment in delay-tolerant networks
H Zhu, S Du, Z Gao, M Dong, Z Cao
IEEE Transactions on Parallel and Distributed Systems 25 (1), 22-32, 2013
1992013
Secure threshold multi authority attribute based encryption without a central authority
H Lin, Z Cao, X Liang, J Shao
International Conference on Cryptology in India, 426-436, 2008
1992008
Proxy re-encryption with keyword search
J Shao, Z Cao, X Liang, H Lin
Information Sciences 180 (13), 2576-2587, 2010
1922010
4S: A secure and privacy-preserving key management scheme for cloud-assisted wireless body area network in m-healthcare social networks
J Zhou, Z Cao, X Dong, N Xiong, AV Vasilakos
Information Sciences 314, 255-276, 2015
1842015
White-box traceable ciphertext-policy attribute-based encryption supporting flexible attributes
J Ning, X Dong, Z Cao, L Wei, X Lin
IEEE Transactions on Information Forensics and Security 10 (6), 1274-1288, 2015
1802015
Provably secure and efficient bounded ciphertext policy attribute based encryption
X Liang, Z Cao, H Lin, D Xing
Proceedings of the 4th international symposium on information, computer, and …, 2009
1772009
Survey of information security
CX Shen, HG Zhang, DG Feng, ZF Cao, JW Huang
Science in China Series F: Information Sciences 50 (3), 273-298, 2007
1562007
Secure threshold multi authority attribute based encryption without a central authority
H Lin, Z Cao, X Liang, J Shao
Information Sciences 180 (13), 2618-2632, 2010
1552010
Auditable -Time Outsourced Attribute-Based Encryption for Access Control in Cloud Computing
J Ning, Z Cao, X Dong, K Liang, H Ma, L Wei
IEEE Transactions on Information Forensics and Security 13 (1), 94-105, 2017
1522017
PDAFT: A privacy-preserving data aggregation scheme with fault tolerance for smart grid communications
L Chen, R Lu, Z Cao
Peer-to-Peer networking and applications 8 (6), 1122-1132, 2015
1482015
Fully secure multi-authority ciphertext-policy attribute-based encryption without random oracles
Z Liu, Z Cao, Q Huang, DS Wong, TH Yuen
European Symposium on Research in Computer Security, 278-297, 2011
1432011
Efficient and provably secure multi-receiver identity-based signcryption
S Duan, Z Cao
Australasian Conference on Information Security and Privacy, 195-206, 2006
1412006
The system can't perform the operation now. Try again later.
Articles 1–20