default search action
Wen Tao Zhu
Person information
- affiliation: State Key Lab of Information Security (DCS Center), Institute of Information Engineering, CAS, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [j28]Feng Gao, Peng Gao, Wen-Tao Zhu, Chenxi Zhang, Xian-kun Meng, Run-hong Shan:
5G evolution promoting innovation of antenna systems. Frontiers Inf. Technol. Electron. Eng. 21(1): 188-194 (2020)
2010 – 2019
- 2019
- [j27]Xiao Lan, Jing Xu, Zhenfeng Zhang, Wen-Tao Zhu:
Investigating the Multi-Ciphersuite and Backwards-Compatibility Security of the Upcoming TLS 1.3. IEEE Trans. Dependable Secur. Comput. 16(2): 272-286 (2019) - 2018
- [j26]Bing Chang, Yao Cheng, Bo Chen, Fengwei Zhang, Wen Tao Zhu, Yingjiu Li, Zhan Wang:
User-friendly deniable storage for mobile devices. Comput. Secur. 72: 163-174 (2018) - [j25]Bing Chang, Yingjiu Li, Qiongxiao Wang, Wen Tao Zhu, Robert H. Deng:
Making a good thing better: enhancing password/PIN-based user authentication with smartwatch. Cybersecur. 1(1): 7 (2018) - [c27]Shiran Pan, Fangyu Zheng, Wen Tao Zhu, Qiongxiao Wang:
Harnessing the Cloud for Secure and Efficient Outsourcing of Non-negative Matrix Factorization. CNS 2018: 1-9 - [c26]Mingyue Wang, Wen-Tao Zhu, Shen Yan, Qiongxiao Wang:
SoundAuth: Secure Zero-Effort Two-Factor Authentication Based on Audio Signals. CNS 2018: 1-9 - [c25]Bing Chang, Fengwei Zhang, Bo Chen, Yingjiu Li, Wen Tao Zhu, Yangguang Tian, Zhan Wang, Albert Ching:
MobiCeal: Towards Secure and Practical Plausibly Deniable Encryption on Mobile Devices. DSN 2018: 454-465 - [c24]Shiran Pan, Wen-Tao Zhu, Qiongxiao Wang, Bing Chang:
Secure and Efficient Outsourcing of Large-Scale Overdetermined Systems of Linear Equations. SecureComm (1) 2018: 529-548 - 2017
- [j24]Xingjie Yu, Zhan Wang, Yingjiu Li, Liang Li, Wen Tao Zhu, Li Song:
EvoPass: Evolvable graphical password against shoulder-surfing attacks. Comput. Secur. 70: 179-198 (2017) - [j23]Wuqiong Pan, Fangyu Zheng, Yuan Zhao, Wen Tao Zhu, Jiwu Jing:
An Efficient Elliptic Curve Cryptography Signature Server With GPU Acceleration. IEEE Trans. Inf. Forensics Secur. 12(1): 111-122 (2017) - [c23]Bing Chang, Ximing Liu, Yingjiu Li, Pingjian Wang, Wen Tao Zhu, Zhan Wang:
Employing Smartwatch for Enhanced Password Authentication. WASA 2017: 691-703 - [i1]Ling Yang, Fuyang Fang, Xianhui Lu, Wen Tao Zhu, Qiongxiao Wang, Shen Yan, Shiran Pan:
A Secure and Fast Dispersal Storage Scheme Based on the Learning with Errors Problem. IACR Cryptol. ePrint Arch. 2017: 105 (2017) - 2016
- [j22]Zhiguo Wan, Wen Tao Zhu, Guilin Wang:
PRAC: Efficient privacy protection for vehicle-to-grid communications in the smart grid. Comput. Secur. 62: 246-256 (2016) - [j21]Wen Tao Zhu, Jingqiang Lin:
Generating Correlated Digital Certificates: Framework and Applications. IEEE Trans. Inf. Forensics Secur. 11(6): 1117-1127 (2016) - [c22]Shen Yan, Shiran Pan, Yuhang Zhao, Wen Tao Zhu:
Towards Privacy-Preserving Data Mining in Online Social Networks: Distance-Grained and Item-Grained Differential Privacy. ACISP (1) 2016: 141-157 - [c21]Shiran Pan, Shen Yan, Wen Tao Zhu:
Security Analysis on Privacy-Preserving Cloud Aided Biometric Identification Schemes. ACISP (2) 2016: 446-453 - [c20]Chong Guan, Kun Sun, Zhan Wang, Wen Tao Zhu:
Privacy Breach by Exploiting postMessage in HTML5: Identification, Evaluation, and Countermeasure. AsiaCCS 2016: 629-640 - [c19]Shen Yan, Shiran Pan, Wen Tao Zhu, Keke Chen:
DynaEgo: Privacy-Preserving Collaborative Filtering Recommender System Based on Social-Aware Differential Privacy. ICICS 2016: 347-357 - [c18]Ling Yang, Fuyang Fang, Xianhui Lu, Wen Tao Zhu, Qiongxiao Wang, Shen Yan, Shiran Pan:
A Secure and Fast Dispersal Storage Scheme Based on the Learning with Errors Problem. SecureComm 2016: 392-411 - 2015
- [j20]Jingqiang Lin, Wen Tao Zhu, Qiongxiao Wang, Nan Zhang, Jiwu Jing, Neng Gao:
RIKE+ : using revocable identities to support key escrow in public key infrastructures with flexibility. IET Inf. Secur. 9(2): 136-147 (2015) - [c17]Wei Wang, Zhan Wang, Wen Tao Zhu, Lei Wang:
WAVE: Secure Wireless Pairing Exploiting Human Body Movements. TrustCom/BigDataSE/ISPA (1) 2015: 1243-1248 - 2014
- [j19]Huimin Shuai, Wen Tao Zhu, Xin Liu:
Publishing and sharing encrypted data with potential friends in online social networks. Secur. Commun. Networks 7(2): 409-421 (2014) - [c16]Xingjie Yu, Zhan Wang, Kun Sun, Wen Tao Zhu, Neng Gao, Jiwu Jing:
Remotely wiping sensitive data on stolen smartphones. AsiaCCS 2014: 537-542 - [c15]Xingjie Yu, Bo Chen, Zhan Wang, Bing Chang, Wen Tao Zhu, Jiwu Jing:
MobiHydra: Pragmatic and Multi-level Plausibly Deniable Encryption Storage for Mobile Devices. ISC 2014: 555-567 - 2013
- [j18]Jing Xu, Wen Tao Zhu:
A Generic Framework for Anonymous Authentication in Mobile Networks. J. Comput. Sci. Technol. 28(4): 732-742 (2013) - [j17]Wen Tao Zhu:
Towards secure and communication-efficient broadcast encryption systems. J. Netw. Comput. Appl. 36(1): 178-186 (2013) - [j16]Cheng-Kang Chu, Wen Tao Zhu, Jin Han, Joseph K. Liu, Jia Xu, Jianying Zhou:
Security Concerns in Popular Cloud Storage Services. IEEE Pervasive Comput. 12(4): 50-57 (2013) - [c14]Baosheng Ge, Wen Tao Zhu:
Preserving User Privacy in the Smart Grid by Hiding Appliance Load Characteristics. CSS 2013: 67-80 - 2012
- [j15]Wen Tao Zhu, Jianying Zhou, Robert H. Deng, Feng Bao:
Detecting node replication attacks in wireless sensor networks: A survey. J. Netw. Comput. Appl. 35(3): 1022-1034 (2012) - [j14]Wen Tao Zhu, Jianying Zhou, Robert H. Deng, Feng Bao:
Detecting node replication attacks in mobile sensor networks: theory and approaches. Secur. Commun. Networks 5(5): 496-507 (2012) - [j13]Wen Tao Zhu:
A Comment on "MABS: Multicast Authentication Based on Batch Signature". IEEE Trans. Mob. Comput. 11(11): 1775-1776 (2012) - [c13]Huimin Shuai, Wen Tao Zhu:
F5P5: Keyword Search over Encrypted Data with Five Functions and Five Privacy Assurances. ICICS 2012: 416-426 - [c12]Huimin Shuai, Wen Tao Zhu:
Masque: Access Control for Interactive Sharing of Encrypted Data in Social Networks. NSS 2012: 503-515 - 2011
- [j12]Jing Xu, Wen Tao Zhu, Dengguo Feng:
An efficient mutual authentication and key agreement protocol preserving user anonymity in mobile networks. Comput. Commun. 34(3): 319-325 (2011) - [j11]Jing Xu, Wen Tao Zhu, Wenting Jin:
A generic framework for constructing cross-realm C2C-PAKA protocols based on the smart card. Concurr. Comput. Pract. Exp. 23(12): 1386-1398 (2011) - [j10]Wen Tao Zhu, Fei Gao, Yang Xiang:
A secure and efficient data aggregation scheme for wireless sensor networks. Concurr. Comput. Pract. Exp. 23(12): 1414-1430 (2011) - [j9]Wen Tao Zhu, Yang Xiang, Jianying Zhou, Robert H. Deng, Feng Bao:
Secure localization with attack detection in wireless sensor networks. Int. J. Inf. Sec. 10(3): 155-171 (2011) - [c11]Cheng-Kang Chu, Wen Tao Zhu, Sherman S. M. Chow, Jianying Zhou, Robert H. Deng:
Secure mobile subscription of sensor-encrypted data. AsiaCCS 2011: 228-237 - [c10]Wen Tao Zhu, Robert H. Deng, Jianying Zhou, Feng Bao:
Applying Time-Bound Hierarchical Key Assignment in Wireless Sensor Networks. ICICS 2011: 306-318 - [c9]Jing Xu, Wen Tao Zhu, Dengguo Feng:
A Smart Card based Generic Construction for Anonymous Authentication in Mobile Networks. SECRYPT 2011: 269-274 - 2010
- [j8]Wen Tao Zhu, Robert H. Deng, Jianying Zhou, Feng Bao:
Time-Bound Hierarchical Key Assignment: An Overview. IEICE Trans. Inf. Syst. 93-D(5): 1044-1052 (2010) - [j7]Junzuo Lai, Wen Tao Zhu, Robert H. Deng, Shengli Liu, Weidong Kou:
New Constructions for Identity-Based Unidirectional Proxy Re-Encryption. J. Comput. Sci. Technol. 25(4): 793-806 (2010) - [c8]Wenbo Yang, Wen Tao Zhu:
Protecting Source Location Privacy in Wireless Sensor Networks with Data Aggregation. UIC 2010: 252-266
2000 – 2009
- 2009
- [j6]Jing Xu, Wen Tao Zhu, Dengguo Feng:
An improved smart card based password authentication scheme with provable security. Comput. Stand. Interfaces 31(4): 723-728 (2009) - [j5]Yang Xiang, Xiang Fan, Wen Tao Zhu:
Propagation of active worms: A survey. Comput. Syst. Sci. Eng. 24(3) (2009) - [j4]Wen Tao Zhu:
Collision Attacks With Budget Constraints on Key Management Schemes for Secure Multimedia Multicast. IEEE Trans. Multim. 11(3): 556-561 (2009) - [c7]Wen Tao Zhu, Yang Xiang:
Argus: A Light-Weighted Secure Localization Scheme for Sensor Networks. ATC 2009: 164-178 - 2008
- [j3]Wen Tao Zhu, Chuan-Kun Wu:
Security of the redefined Liaw's broadcasting cryptosystem. Comput. Math. Appl. 56(7): 1665-1667 (2008) - [j2]Wen Tao Zhu:
A Cost-Efficient Secure Multimedia Proxy System. IEEE Trans. Multim. 10(6): 1214-1220 (2008) - [c6]Wen Tao Zhu:
General Weakness in Certain Broadcast Encryption Protocols Employing the Remainder Approach. ICC 2008: 1620-1624 - [c5]Wen Tao Zhu:
Analyzing Euler-Fermat Theorem Based Multicast Key Distribution Schemes with Chinese Remainder Theorem. NPC Workshops 2008: 11-17 - [c4]Fei Gao, Wen Tao Zhu:
A Dual-Head Cluster Based Secure Aggregation Scheme for Sensor Networks. NPC Workshops 2008: 103-110 - 2007
- [c3]Wen Tao Zhu:
Remarks on a Hypersphere Oriented Multiparty Key Agreement Protocol. WCNC 2007: 2709-2713 - 2005
- [j1]Wen Tao Zhu:
Optimizing the tree structure in secure multicast key management. IEEE Commun. Lett. 9(5): 477-479 (2005) - [c2]Wen Tao Zhu:
Cryptanalysis of Two Group Key Management Protocols for Secure Multicast. CANS 2005: 35-48 - 2004
- [c1]Wen Tao Zhu, Jinsheng Li, Peilin Hong:
Rethinking of Iolus: Constructing the Secure Multicast Infrastructure. ICOIN 2004: 895-904
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint