default search action
Zhihua Zheng
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j21]Jian Zhu, Qian Li, Shi Ying, Zhihua Zheng:
Research on Parallel Task Scheduling Algorithm of SaaS Platform Based on Dynamic Adaptive Particle Swarm Optimization in Cloud Service Environment. Int. J. Comput. Intell. Syst. 17(1): 260 (2024) - [j20]Han Jiang, Qiuliang Xu, Changyuan Liu, Zhihua Zheng, Yi Tang, Mingqiang Wang:
Cut-and-choose bilateral oblivious transfer protocol based on DDH assumption. J. Ambient Intell. Humaniz. Comput. 15(2): 1327-1337 (2024) - 2022
- [j19]Pingyuan Zhang, Han Jiang, Zhihua Zheng, Hao Wang, Qiuliang Xu:
A New and Efficient Lattice-Based Online/Offline Signature From Perspective of Abort. Comput. J. 65(9): 2400-2410 (2022) - [j18]Jinjiang Li, Zhihua Zheng, Zhi Li, Ziyu Niu, Hong Qin, Hao Wang:
A blockchain-based traceable group loan system. Concurr. Comput. Pract. Exp. 34(16) (2022) - 2021
- [j17]Zhihua Zheng, Victor S. Sheng, Lei Wang, Zhi Li, Xue-Feng Xi, Zhiming Cui:
SemicNet: a semicircular network for the segmentation of the liver and its lesions. Int. J. Sens. Networks 35(3): 161-169 (2021) - 2020
- [j16]Xiaochao Wei, Lin Xu, Hao Wang, Zhihua Zheng:
Permutable Cut-and-Choose Oblivious Transfer and Its Application. IEEE Access 8: 17378-17389 (2020) - [j15]Qian Zhang, Rong Cheng, Zhihua Zheng:
Energy-efficient renewable scheme for rechargeable sensor networks. EURASIP J. Wirel. Commun. Netw. 2020(1): 74 (2020) - [j14]Shengnan Zhao, Xiangfu Song, Han Jiang, Ming Ma, Zhihua Zheng, Qiuliang Xu:
An Efficient Outsourced Oblivious Transfer Extension Protocol and Its Applications. Secur. Commun. Networks 2020: 8847487:1-8847487:12 (2020)
2010 – 2019
- 2019
- [j13]Jie Cai, Han Jiang, Pingyuan Zhang, Zhihua Zheng, Guangshi Lyu, Qiuliang Xu:
An Efficient Strong Designated Verifier Signature Based on ℛ-SIS Assumption. IEEE Access 7: 3938-3947 (2019) - [j12]Han Jiang, Hao Wang, Zhihua Zheng, Qiuliang Xu:
Privacy preserved wireless sensor location protocols based on mobile edge computing. Comput. Secur. 84: 393-401 (2019) - [j11]Jie Cai, Han Jiang, Pingyuan Zhang, Zhihua Zheng, Hao Wang, Guangshi Lü, Qiuliang Xu:
ID-Based Strong Designated Verifier Signature over ℛ-SIS Assumption. Secur. Commun. Networks 2019: 9678095:1-9678095:8 (2019) - [c8]Qian Zhang, Zhihua Zheng, Weiqiang Wu, Rong Cheng:
A Renewable Charging Approach with Low Energy Consumption in Wireless Sensor Networks. ICCT 2019: 972-977 - 2018
- [j10]Pingyuan Zhang, Han Jiang, Zhihua Zheng, Peichu Hu, Qiuliang Xu:
A New Post-Quantum Blind Signature From Lattice Assumptions. IEEE Access 6: 27251-27258 (2018) - [j9]Hao Wang, Debiao He, Jian Shen, Zhihua Zheng, Xiaoyan Yang, Man Ho Au:
Fuzzy matching and direct revocation: a new CP-ABE scheme from multilinear maps. Soft Comput. 22(7): 2267-2274 (2018) - [c7]Xiaoyan Yang, Han Jiang, Mengbo Hou, Zhihua Zheng, Qiuliang Xu, Kim-Kwang Raymond Choo:
A Provably-Secure Two-Factor Authenticated Key Exchange Protocol with Stronger Anonymity. NSS 2018: 111-124 - 2017
- [j8]Hao Wang, Zhihua Zheng, Lei Wu, Ping Li:
New directly revocable attribute-based encryption scheme and its application in cloud storage environment. Clust. Comput. 20(3): 2385-2392 (2017) - [j7]Qingming Zhan, Shuguang Deng, Zhihua Zheng:
An Adaptive Sweep-Circle Spatial Clustering Algorithm Based on Gestalt. ISPRS Int. J. Geo Inf. 6(9): 272 (2017) - [j6]Hao Wang, Zhihua Zheng, Yilei Wang:
Cloud-aided online/offline ciphertext-policy attribute-based encryption in the standard model. Int. J. Grid Util. Comput. 8(3): 211-221 (2017) - [j5]Hao Wang, Debiao He, Jian Shen, Zhihua Zheng, Chuan Zhao, Minghao Zhao:
Verifiable outsourced ciphertext-policy attribute-based encryption in cloud computing. Soft Comput. 21(24): 7325-7335 (2017) - 2016
- [j4]Hao Wang, Zhihua Zheng, Lei Wu, Debiao He:
New large-universe multi-authority ciphertext-policy ABE scheme and its application in cloud storage systems. J. High Speed Networks 22(2): 153-167 (2016) - 2015
- [j3]Hao Wang, Zhihua Zheng, Bo Yang:
New identity-based key-encapsulation mechanism and its applications in cloud computing. Int. J. High Perform. Comput. Netw. 8(2): 124-134 (2015) - [j2]Yilei Wang, Chuan Zhao, Qiuliang Xu, Zhihua Zheng, Zhenhua Chen, Zhe Liu:
Fair Secure Computation with Reputation Assumptions in the Mobile Social Networks. Mob. Inf. Syst. 2015: 637458:1-637458:8 (2015) - 2014
- [c6]Hao Wang, Zhihua Zheng, Lei Wu:
Hierarchial Identity-Based Encryption Scheme from Multilinear Maps. CIS 2014: 455-458 - 2013
- [c5]Hao Wang, Zhihua Zheng, Yilei Wang:
A New Privacy-Preserving Broadcast Encryption Scheme from DPVS. INCoS 2013: 329-334 - [i1]Hao Wang, Lei Wu, Zhihua Zheng, Yilei Wang:
Identity-Based Key-Encapsulation Mechanism from Multilinear Maps. IACR Cryptol. ePrint Arch. 2013: 836 (2013) - 2012
- [c4]Yang Cai, Qiuliang Xu, Zhihua Zheng:
A Provably Secure Identity-Based Key Agreement Protocol from Key Encapsulation Scheme. CIS 2012: 636-640
2000 – 2009
- 2009
- [c3]Zhihua Zheng, Zongjue Qian, Guochu Shou, Yihong Hu:
OCDMA over WDM System Based on Chebyshev-Map Chaotic Spread Spectrum in Passive Optical Network. CSIE (1) 2009: 208-211 - 2008
- [c2]Zhihua Zheng, He Xu, Jianhua Wu:
Average power control algorithm with dynamic channel assignment for TDD-CDMA systems. ICAIT 2008: 103:1-103:5 - 2007
- [c1]Shengen Xiao, Jinjie Shi, Zhihua Zheng, Liping Xiong, ZhiMin Liu:
Growth Analysis and CUSSIM Model in Cucumber Seedling. IITA 2007: 319-322 - 2006
- [j1]Zhihua Zheng, Lirong Cui, Alan G. Hawkes:
A study on a single-unit Markov repairable system with repair time omission. IEEE Trans. Reliab. 55(2): 182-188 (2006)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-10 21:43 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint