default search action
Huawei Zhao
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [j14]Yun Peng, Yitong Xu, Huawei Zhao, Zhizheng Zhou, Huimin Han:
Most similar maximal clique query on large graphs. Frontiers Comput. Sci. 14(3): 143601 (2020)
2010 – 2019
- 2019
- [c14]Huawei Zhao, Wei Cui, Shouwei Li, Ruzhi Xu:
Token Economy: A New Form Economy with Decentralized Mutual Trust and Collective Governance. ISADS 2019: 1-7 - 2018
- [j13]Huawei Zhao, Peidong Bai, Yun Peng, Ruzhi Xu:
Efficient key management scheme for health blockchain. CAAI Trans. Intell. Technol. 3(2): 114-118 (2018) - 2017
- [j12]Huawei Zhao, Minglei Shu, Jing Qin, Jiankun Hu:
Key negotiation schemes for body sensor networks on the surface of the human body. Int. J. Auton. Adapt. Commun. Syst. 10(1): 55-66 (2017) - [c13]Yun Peng, Ruzhi Xu, Huawei Zhao, Zhizheng Zhou, Ni Wu, Ying Yang:
Random Walk Based Trade Reference Computation for Personal Credit Scoring. ISADS 2017: 122-127 - [c12]Ruzhi Xu, Lu Zhang, Huawei Zhao, Yun Peng:
Design of Network Media's Digital Rights Management Scheme Based on Blockchain Technology. ISADS 2017: 128-133 - [c11]Huawei Zhao, Yong Zhang, Yun Peng, Ruzhi Xu:
Lightweight Backup and Efficient Recovery Scheme for Health Blockchain Keys. ISADS 2017: 229-234 - 2016
- [j11]Jia Yu, Rong Hao, Huawei Zhao, Minglei Shu, Jianxi Fan:
IRIBE: Intrusion-resilient identity-based encryption. Inf. Sci. 329: 90-104 (2016) - [j10]Huawei Zhao, Ruzhi Xu, Minglei Shu, Jiankun Hu:
Physiological-signal-based key negotiation protocols for body sensor networks: A survey. Simul. Model. Pract. Theory 65: 32-44 (2016) - [j9]Jia Yu, Hui Xia, Huawei Zhao, Rong Hao, Zhangjie Fu, Xiangguo Cheng:
Forward-Secure Identity-Based Signature Scheme in Untrusted Update Environments. Wirel. Pers. Commun. 86(3): 1467-1491 (2016) - 2015
- [j8]Huawei Zhao, Chi Chen, Jiankun Hu, Jing Qin:
Securing Body Sensor Networks with Biometric Methods: A New Key Negotiation Method and a Key Sampling Method for Linear Interpolation Encryption. Int. J. Distributed Sens. Networks 11: 764919:1-764919:11 (2015) - [j7]Huawei Zhao, Jiankun Hu:
A Trusted Mobile Payment Scheme Based on Body Area Networks. EAI Endorsed Trans. Ind. Networks Intell. Syst. 2(2): e5 (2015) - [c10]Huawei Zhao, Ruzhi Xu, Minglei Shu, Jiankun Hu:
Physiological-Signal-Based Key Negotiation Protocols for Body Sensor Networks: A Survey. ISADS 2015: 63-70 - 2014
- [j6]Fei Han, Jing Qin, Huawei Zhao, Jiankun Hu:
A general transformation from KP-ABE to searchable encryption. Future Gener. Comput. Syst. 30: 107-115 (2014) - [j5]Jing Qin, Hongwei Duan, Huawei Zhao, Jiankun Hu:
A new Lagrange solution to the privacy-preserving general geometric intersection problem. J. Netw. Comput. Appl. 46: 94-99 (2014) - 2013
- [j4]Huawei Zhao, Jing Qin, Jiankun Hu:
An Energy Efficient Key Management Scheme for Body Sensor Networks. IEEE Trans. Parallel Distributed Syst. 24(11): 2202-2210 (2013) - [c9]Huawei Zhao, Minglei Shu, Jing Qin, Jiankun Hu:
A Key Management Scheme between Body Sensor Networks and the Base Station. CIS 2013: 743-747 - 2012
- [j3]Jia Yu, Fanyu Kong, Huawei Zhao, Xiangguo Cheng, Rong Hao, Xiang-Fa Guo:
Non-Interactive Forward-Secure Threshold Signature without Random Oracles. J. Inf. Sci. Eng. 28(3): 571-586 (2012) - [c8]Fei Han, Jing Qin, Huawei Zhao, Jiankun Hu:
A General Transformation from KP-ABE to Searchable Encryption. CSS 2012: 165-178 - [c7]Huawei Zhao, Jing Qin, Minglei Shu, Jiankun Hu:
A Hash Chains Based Key Management Scheme for Wireless Sensor Networks. CSS 2012: 296-308 - [c6]Jia Yu, Shuguang Wang, Huawei Zhao, Minglei Shu, Jia-liang Lv, Qiang Guo:
A Simultaneous Members Enrollment and Revocation Protocol for Secret Sharing Schemes. PAISI 2012: 190-197 - [c5]Jing Qin, Jiankun Hu, Huawei Zhao:
Simulatable Oblivious Transfer Protocols Based on Blind Signature. TrustCom 2012: 466-473 - [c4]Huawei Zhao, Jiankun Hu, Jing Qin, Vijay Varadharajan, Haishan Wan:
Hashed Random Key Pre-distribution Scheme for Large Heterogeneous Sensor Networks. TrustCom 2012: 706-713 - 2010
- [j2]Jing Qin, Huawei Zhao:
k out of n Oblivious Transfer Protocols from Bilinear Pairings. J. Softw. 5(1): 65-72 (2010)
2000 – 2009
- 2009
- [c3]Huawei Zhao, Ruixia Liu:
A Scheme to Improve Security of SSL. PACCS 2009: 401-404 - 2008
- [c2]Huawei Zhao, Jing Qin, Zhifeng Fang:
Converters for Designing Applied Cryptographic Protocols. EUC (2) 2008: 139-143 - [c1]Huawei Zhao, Wenyu Zhang:
Definitions and Analysis of Integrity in Strand Spaces Model. ISECS 2008: 153-158 - 2003
- [j1]Feng Liu, Huawei Zhao, Stuart Crozier:
On the induced electric field gradients in the human body for magnetic stimulation by gradient coils in MRI. IEEE Trans. Biomed. Eng. 50(7): 804-815 (2003)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-02 01:04 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint