Follow
Zhenfu Cao
Zhenfu Cao
Professor of School of Computer Science and Software Engineering, East China Normal University
Verified email at sei.ecnu.edu.cn - Homepage
Title
Cited by
Cited by
Year
Security and privacy for storage and computation in cloud computing
L Wei, H Zhu, Z Cao, X Dong, W Jia, Y Chen, AV Vasilakos
Information sciences 258, 371-386, 2014
6472014
Security and privacy for cloud-based IoT: Challenges
J Zhou, Z Cao, X Dong, AV Vasilakos
IEEE Communications Magazine 55 (1), 26-33, 2017
5492017
CCA-secure proxy re-encryption without pairings
J Shao, Z Cao
International Workshop on Public Key Cryptography, 357-376, 2009
4132009
信息安全综述
沈昌祥, 张焕国, 冯登国, 曹珍富, 黄继武
中国科学: E 辑 37 (002), 129-150, 2007
3272007
Attribute based proxy re-encryption with delegating capabilities
X Liang, Z Cao, H Lin, J Shao
Proceedings of the 4th International Symposium on Information, Computer, and …, 2009
3042009
丢番图方程引论
珍富
哈尔滨工业大学出版社, 1989
2631989
Simple three-party key exchange protocol
R Lu, Z Cao
Computers & Security 26 (1), 94-97, 2007
2112007
White-box traceable ciphertext-policy attribute-based encryption supporting any monotone access structures
Z Liu, Z Cao, DS Wong
IEEE Transactions on Information Forensics and Security 8 (1), 76-88, 2012
2062012
A probabilistic misbehavior detection scheme toward efficient trust establishment in delay-tolerant networks
H Zhu, S Du, Z Gao, M Dong, Z Cao
IEEE Transactions on Parallel and Distributed Systems 25 (1), 22-32, 2013
1972013
Secure threshold multi authority attribute based encryption without a central authority
H Lin, Z Cao, X Liang, J Shao
International Conference on Cryptology in India, 426-436, 2008
1932008
4S: A secure and privacy-preserving key management scheme for cloud-assisted wireless body area network in m-healthcare social networks
J Zhou, Z Cao, X Dong, N Xiong, AV Vasilakos
Information Sciences 314, 255-276, 2015
1832015
Proxy re-encryption with keyword search
J Shao, Z Cao, X Liang, H Lin
Information Sciences 180 (13), 2576-2587, 2010
1832010
White-box traceable ciphertext-policy attribute-based encryption supporting flexible attributes
J Ning, X Dong, Z Cao, L Wei, X Lin
IEEE Transactions on Information Forensics and Security 10 (6), 1274-1288, 2015
1752015
Provably secure and efficient bounded ciphertext policy attribute based encryption
X Liang, Z Cao, H Lin, D Xing
Proceedings of the 4th international symposium on information, computer, and …, 2009
1712009
Secure threshold multi authority attribute based encryption without a central authority
H Lin, Z Cao, X Liang, J Shao
Information Sciences 180 (13), 2618-2632, 2010
1542010
Survey of information security
CX Shen, HG Zhang, DG Feng, ZF Cao, JW Huang
Science in China Series F: Information Sciences 50 (3), 273-298, 2007
1512007
Auditable -Time Outsourced Attribute-Based Encryption for Access Control in Cloud Computing
J Ning, Z Cao, X Dong, K Liang, H Ma, L Wei
IEEE Transactions on Information Forensics and Security 13 (1), 94-105, 2017
1462017
Fully secure multi-authority ciphertext-policy attribute-based encryption without random oracles
Z Liu, Z Cao, Q Huang, DS Wong, TH Yuen
European Symposium on Research in Computer Security, 278-297, 2011
1422011
PDAFT: A privacy-preserving data aggregation scheme with fault tolerance for smart grid communications
L Chen, R Lu, Z Cao
Peer-to-Peer networking and applications 8 (6), 1122-1132, 2015
1412015
Location privacy in database-driven cognitive radio networks: Attacks and countermeasures
Z Gao, H Zhu, Y Liu, M Li, Z Cao
2013 Proceedings IEEE INFOCOM, 2751-2759, 2013
1382013
The system can't perform the operation now. Try again later.
Articles 1–20