default search action
Hongfeng Zhu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j64]Chaonan Wang, Hongfeng Zhu:
A hybrid dynamic n-party quantum key exchange protocol based on three-particle GHZ states. Quantum Inf. Process. 23(3): 64 (2024) - [j63]Chaonan Wang, Qian Zhang, Shufan Liang, Hongfeng Zhu:
Secure mutual authentication quantum key agreement scheme for two-party setting with key recycling. Quantum Inf. Process. 23(4): 139 (2024) - [j62]Yan Sun, Chaonan Wang, Lu Zhang, Hongfeng Zhu:
A novel scalable three-level hierarchical quantum information splitting scheme for two-qubit unknown states. Quantum Inf. Process. 23(8): 295 (2024) - 2023
- [j61]Hongfeng Zhu, Yingna Chao:
Drivers of the VR technologies user behaviour in e-commerce during the COVID-19 pandemic. Electron. Commer. Res. Appl. 62: 101319 (2023) - 2022
- [j60]Hongfeng Zhu, Xintong Wang, Yeh-Cheng Chen, Xueying Wang:
Security analysis and improvements of a universal construction for a round-optimal password authenticated key exchange protocol. Int. J. Inf. Comput. Secur. 17(1/2): 104-118 (2022) - [j59]Hongfeng Zhu, Zhiqin Du, Liwei Wang, Yuanle Zhang:
A N-party authenticated group key distribution protocol using quantum-reflection architecture. Int. J. Inf. Comput. Secur. 19(3/4): 237-253 (2022) - [j58]Yuguang Xu, Chaonan Wang, Xueying Wang, Hongfeng Zhu:
Scalable multiple GHZ states equations and its applications in efficient quantum key agreement. Quantum Inf. Process. 21(3): 91 (2022) - [j57]Yuguang Xu, Yanlin Meng, Hongfeng Zhu:
An Efficient Double-Offloading Biometric Authentication Scheme Based on Blockchain for Cross Domain Environment. Wirel. Pers. Commun. 125(1): 599-618 (2022) - 2021
- [j56]Dan Zhu, Hongfeng Zhu, Zixi Wang, Yuanle Zhang:
Three-level quantum satellite communication framework and its applications. Int. J. Satell. Commun. Netw. 39(5): 473-485 (2021) - [j55]Jingjing Yang, Zexi Li, Jinzhao Wu, Hongfeng Zhu:
One-round semi-quantum-honest key agreement scheme in MSTSA structure without entanglement. Quantum Inf. Process. 20(5): 188 (2021) - [j54]Yuguang Xu, Zexi Li, Chaonan Wang, Hongfeng Zhu:
Quantum sealed-bid auction protocol for simultaneous ascending auction with GHZ states. Quantum Inf. Process. 20(7): 1-14 (2021) - [j53]Yuguang Xu, Zexi Li, Liuyi Chen, Hongfeng Zhu:
Verifiable user quantum session key agreement protocol for smart home environment. Quantum Inf. Process. 20(12): 390 (2021) - 2020
- [j52]Hongfeng Zhu, Xueying Wang, Chien-Ming Chen, Saru Kumari:
Two novel semi-quantum-reflection protocols applied in connected vehicle systems with blockchain. Comput. Electr. Eng. 86: 106714 (2020) - [j51]Dan Zhu, Xueying Wang, Hongfeng Zhu:
Semi-quantum-honest key agreement scheme with three-particle entangled states in cross-realm setting. Quantum Inf. Process. 19(10): 376 (2020) - [j50]Hongfeng Zhu, Liwei Wang, Yuanle Zhang:
An efficient quantum identity authentication key agreement protocol without entanglement. Quantum Inf. Process. 19(10): 381 (2020)
2010 – 2019
- 2019
- [j49]Hongfeng Zhu:
A simplified deniable authentication scheme in cloud-based pay-TV system with privacy protection. Int. J. Commun. Syst. 32(11) (2019) - [j48]Rui Wang, Hongfeng Zhu:
An Enhanced RFID Mutual Authentication Protocol based on Quantum Dynamic Basis. J. Inf. Hiding Multim. Signal Process. 10(1): 44-52 (2019) - [j47]Hongfeng Zhu, Rui Wang:
An Automatically Iterated One-Time Basis Authenticated Scheme Against Relay Attack. Wirel. Pers. Commun. 109(3): 1863-1873 (2019) - [j46]Hongfeng Zhu, Shuai Geng:
A Three-Party Dynamic Identity-Based Authenticated Key Exchange Protocol with Forward Anonymity. Wirel. Pers. Commun. 109(3): 1911-1924 (2019) - [i1]Jiaxin Cai, Hongfeng Zhu:
Lung image segmentation by generative adversarial networks. CoRR abs/1907.13033 (2019) - 2018
- [j45]Hongfeng Zhu, Rui Wang:
A Survey to Design Privacy Preserving Protocol Using Chaos Cryptography. Int. J. Netw. Secur. 20(2): 313-322 (2018) - [j44]Hongfeng Zhu, Junlin Liu:
Provably Secure and Repeatable Authenticated Privacy-Protection Scheme Using Chaotic Maps with Distributed Architecture. Int. J. Netw. Secur. 20(3): 463-471 (2018) - [j43]Dan Zhu, Hongfeng Zhu, Shuai Geng, Yanlin Meng:
A Novel Two-party Password-Authenticated Key Retrieval Scheme. J. Inf. Hiding Multim. Signal Process. 9(3): 586-595 (2018) - [j42]Tianhua Liu, Yanlin Meng, Hongfeng Zhu:
Provably Secure and Password-Authenticated Quantum Key Agreement Protocol with Dynamic Basis. J. Inf. Hiding Multim. Signal Process. 9(3): 651-660 (2018) - [j41]Dan Zhu, Hongfeng Zhu, Shuai Geng, Rui Wang:
Provably Secure and Password-Authenticated Hybrid Key Agreement Protocol in Two-realm with Privacy-Protection. J. Inf. Hiding Multim. Signal Process. 9(4): 775-784 (2018) - [j40]Hongfeng Zhu, Rui Wang, Junlin Liu:
A Lightweight RFID Authentication Protocol using Qubits against Relay Attack. J. Inf. Hiding Multim. Signal Process. 9(4): 874-883 (2018) - [j39]Hongfeng Zhu, Zixi Wang:
Provably Secure and Distributed Authenticated Quantum Key Agreement Protocol with User-Privacy using Dynamic Basis. J. Inf. Hiding Multim. Signal Process. 9(5): 1212-1221 (2018) - 2017
- [j38]Yang Sun, Xueshuai Feng, Hongfeng Zhu:
Two-phase Commit with Security Services: Using Distinctive Proofs to Relieve Fragile Communications. Int. J. Netw. Secur. 19(2): 217-228 (2017) - [j37]Yang Sun, Hongfeng Zhu, Xueshuai Feng:
A Novel and Concise Multi-receiver Protocol Based on Chaotic Maps with Privacy Protection. Int. J. Netw. Secur. 19(3): 371-382 (2017) - [j36]Hongfeng Zhu, Yifeng Zhang:
An Improved Two-party Password-Authenticated Key Agreement Protocol with Privacy Protection Based on Chaotic Maps. Int. J. Netw. Secur. 19(4): 487-497 (2017) - [j35]Hongfeng Zhu:
A Novel Two-party Scheme against Off-line Password Guessing Attacks using New Theorem of Chaotic maps. KSII Trans. Internet Inf. Syst. 11(12): 6187-6204 (2017) - [j34]Hongfeng Zhu, Rui Wang:
Multi-party Password-Authenticated Key Exchange Scheme with Privacy Preserving using Chaotic Maps in Random Oracle Model. J. Inf. Hiding Multim. Signal Process. 8(1): 42-53 (2017) - [j33]Hongfeng Zhu, Shuai Geng:
Simple and Universal Construction for Round-Optimal Password Authenticated Key Exchange towards Quantum-Resistant. J. Inf. Hiding Multim. Signal Process. 8(4): 798-807 (2017) - [j32]Na Lin, Hongfeng Zhu:
Enhancing The Security of Chaotic Maps-based Password-Authenticated Key agreement Using Smart Card. J. Inf. Hiding Multim. Signal Process. 8(6): 1273-1282 (2017) - [j31]Hongfeng Zhu, Yan Zhang:
An Efficient Chaotic Maps-Based Deniable Authentication Group Key Agreement Protocol. Wirel. Pers. Commun. 96(1): 217-229 (2017) - 2016
- [j30]Hongfeng Zhu, Yifeng Zhang, Yan Zhang, Haiyang Li:
A Novel and Provable Authenticated Key Agreement Protocol with Privacy Protection Based on Chaotic Maps towards Mobile Network. Int. J. Netw. Secur. 18(1): 116-123 (2016) - [j29]Hongfeng Zhu, Yan Zhang, Haiyang Li, Lin Lin:
A Novel Biometrics-based One-Time Commitment Authenticated Key Agreement Scheme with Privacy Protection for Mobile Network. Int. J. Netw. Secur. 18(2): 209-216 (2016) - [j28]Hongfeng Zhu, Yifeng Zhang, Yu Xia, Haiyang Li:
Password-Authenticated Key Exchange Scheme Using Chaotic Maps towards a New Architecture in Standard Model. Int. J. Netw. Secur. 18(2): 326-334 (2016) - [j27]Hongfeng Zhu, Yan Zhang, Xiaodan Wang:
A Novel One-Time Identity-Password Authenticated Scheme Based on Biometrics for E-coupon System. Int. J. Netw. Secur. 18(3): 401-409 (2016) - [j26]Hongfeng Zhu, Yifeng Zhang, Yan Zhang:
A Provably Password Authenticated Key Exchange Scheme Based on Chaotic Maps in Different Realm. Int. J. Netw. Secur. 18(4): 688-698 (2016) - [j25]Hongfeng Zhu, Yifeng Zhang, Yang Sun:
Provably Secure Multi-server Privacy-Protection System Based on Chebyshev Chaotic Maps without Using Symmetric Cryptography. Int. J. Netw. Secur. 18(5): 803-815 (2016) - [j24]Hongfeng Zhu:
Secure Chaotic Maps-based Group Key Agreement Scheme with Privacy Preserving. Int. J. Netw. Secur. 18(6): 1001-1009 (2016) - [j23]Hongfeng Zhu, Dan Zhu, Yan Zhang:
A Multi-server Authenticated Key Agreement Protocol with Privacy preserving Based on Chaotic Maps in Random Oracle Model. J. Inf. Hiding Multim. Signal Process. 7(1): 59-71 (2016) - [j22]Hongfeng Zhu, Tianhua Liu, Yu Xia:
A Password-Authenticated Key Exchange Scheme Using Chaotic Maps towards Multiple Servers to Server. J. Inf. Hiding Multim. Signal Process. 7(2): 222-232 (2016) - [j21]Yang Sun, Hongfeng Zhu, Xueshuai Feng:
An Enhanced Dragonfly Key Exchange Protocol Using Chaotic Maps. J. Inf. Hiding Multim. Signal Process. 7(2): 376-385 (2016) - [j20]Hongfeng Zhu, Dan Zhu, Yifeng Zhang, Yan Zhang:
A Novel On-Demand Password Scheme Based on BAN Logic. J. Inf. Hiding Multim. Signal Process. 7(3): 475-488 (2016) - [j19]Jeng-Shyang Pan, Hongfeng Zhu:
An Efficient Human-Verifiable Key Agreement Scheme with Privacy Preserving with Human Bond Communication for Mobile Devices. J. Inf. Hiding Multim. Signal Process. 7(4): 867-880 (2016) - 2015
- [j18]Hongfeng Zhu:
A Provable One-way Authentication Key Agreement Scheme with User Anonymity for Multi-server Environment. KSII Trans. Internet Inf. Syst. 9(2): 811-829 (2015) - [j17]Hongfeng Zhu, Man Jiang, Xin Hao, Yan Zhang:
Robust Biometrics-based Key Agreement Scheme with Smart Cards towards a New Architecture. J. Inf. Hiding Multim. Signal Process. 6(1): 81-98 (2015) - [j16]Hongfeng Zhu, Xin Hao, Yifeng Zhang, Man Jiang:
A biometrics-based multi-server key agreement scheme on chaotic maps cryptosystem. J. Inf. Hiding Multim. Signal Process. 6(2): 211-224 (2015) - [j15]Hongfeng Zhu, Yifeng Zhang, Yan Zhang:
A One-Way Authentication Key Agreement Scheme with User Anonymity Based on Chaotic maps towards Multi-Server Architecture. J. Inf. Hiding Multim. Signal Process. 6(2): 274-287 (2015) - [j14]Hongfeng Zhu, Yu Xia, Hui Li:
An Effcient and Secure Biometrics-based One-Time Identity-Password Authenticated Scheme for E-coupon System towards Mobile Internet. J. Inf. Hiding Multim. Signal Process. 6(3): 444-457 (2015) - [j13]Hongfeng Zhu, Xin Hao, Huiyan Liu:
An Effcient Authenticated Key Agreement Protocol Based on Chaotic Maps with Privacy Protection using Smart Card. J. Inf. Hiding Multim. Signal Process. 6(3): 500-510 (2015) - [j12]Hongfeng Zhu, Yu Xia, Yan Zhang:
A Novel Client-to-Client Password-Authenticated Key Exchange Protocol using Chaotic Maps in the Standard Model. J. Inf. Hiding Multim. Signal Process. 6(5): 997-1008 (2015) - [j11]Hongfeng Zhu, Huiyan Liu, Yifeng Zhang, Yan Zhang:
Three-party Authentication Key Agreement Protocol Based on Chaotic Maps in the Standard Model with Privacy Preserving. J. Inf. Hiding Multim. Signal Process. 6(6): 1077-1087 (2015) - [j10]Hongfeng Zhu, Yan Zhang:
Enhanced Graphical Captcha Framework and Applications to Strong Security Authenticated Scheme without Password Table. J. Inf. Hiding Multim. Signal Process. 6(6): 1295-1309 (2015) - [j9]Hongfeng Zhu:
One-time identity-password authenticated key agreement scheme based on biometrics. Secur. Commun. Networks 8(13): 2350-2360 (2015) - [j8]Hongfeng Zhu:
Cryptanalysis and provable improvement of a chaotic maps-based mobile dynamic ID authenticated key agreement scheme. Secur. Commun. Networks 8(17): 2981-2991 (2015) - [j7]Hongfeng Zhu:
Flexible and Password-Authenticated Key Agreement Scheme Based on Chaotic Maps for Multiple Servers to Server Architecture. Wirel. Pers. Commun. 82(3): 1697-1718 (2015) - [j6]Hongfeng Zhu:
Cryptanalysis and Improvement of a Mobile Dynamic ID Authenticated Key Agreement Scheme Based on Chaotic Maps. Wirel. Pers. Commun. 85(4): 2141-2156 (2015) - 2014
- [j5]Tian-Hua Liu, Qian Wang, Hong-Feng Zhu:
A Multi-function Password Mutual Authentication Key Agreement Scheme with privacy preserving. J. Inf. Hiding Multim. Signal Process. 5(2): 165-178 (2014) - [j4]Hongfeng Zhu:
Structured and Efficient Password-Based Group Key Agreement Protocol. J. Inf. Hiding Multim. Signal Process. 5(4): 649-665 (2014) - [j3]Hongfeng Zhu, Xin Hao, Yang Sun:
Elliptic Curve Isogenies-Based Three-party Password Authenticated Key Agreement Scheme towards Quantum-Resistant. J. Inf. Hiding Multim. Signal Process. 5(4): 672-689 (2014) - 2013
- [j2]Hongfeng Zhu, Tianhua Liu, Dan Zhu, Haiyang Li:
Robust and Simple N-Party Entangled Authentication Cloud Storage Protocol Based on Secret Sharing Scheme. J. Inf. Hiding Multim. Signal Process. 4(2): 110-118 (2013) - 2010
- [c14]Tianhua Liu, Hongfeng Zhu:
An ID-based Multi-server Authentication with Key Agreement Scheme without Verification Table on Elliptic Curve Cryptosystem. CASoN 2010: 61-64 - [c13]Yang Sun, Hongfeng Zhu:
A Novel Method to Characterize Unwanted Email Traffic. CASoN 2010: 65-68 - [c12]Hongfeng Zhu, Tianhua Liu:
A Robust and Efficient Password-authenticated Key Agreement Scheme without Verification Table Based on Elliptic Curve Cryptosystem. CASoN 2010: 74-77 - [c11]Shidong Yu, Hang Li, Hongfeng Zhu, Chen Wang:
Improving Network Security and Performance by Multipath Routing in Ad Hoc Networks. CASoN 2010: 78-81 - [c10]Chengzhe Li, Hongfeng Zhu, Tianhua Liu:
An Improved Tree-Based Distribution Group Key Agreement Protocol. CASoN 2010: 89-92 - [c9]Ning Jiang, Liancheng Shan, Hongfeng Zhu, Jian Yu:
Application of Trusted Boundary Based on Port Trust Value in Campus Area Network. CASoN 2010: 97-100
2000 – 2009
- 2009
- [c8]Hongfeng Zhu, Tianhua Liu, Jie Liu:
Robust and Simple Multi-server Authentication Protocol without Verification Table. HIS (3) 2009: 51-56 - [c7]Hongfeng Zhu, Tianhua Liu, Zhenhua Tan:
An Efficient Concealment Searching Model in P2P Network. HIS (2) 2009: 400-403 - 2008
- [j1]Hongfeng Zhu, Tianhua Liu, Jie Liu:
EV-C2C-PAKE: An improved client-to-client password-authenticated key exchange protocol. Comput. Syst. Sci. Eng. 23(3) (2008) - [c6]Tianhua Liu, Hongfeng Zhu, Guiran Chang, Chuansheng Zhou:
The Design and Implementation of Zero-Copy for Linux. ISDA (1) 2008: 121-126 - 2007
- [c5]Tian-Hua Liu, Hong-Feng Zhu, Chuan-Sheng Zhou, Gui-Ran Chang:
Design and Simulation of VHDL based ARP Cache. IIH-MSP 2007: 373-376 - [c4]Hongfeng Zhu, Tianhua Liu, Jie Liu, Guiran Chang:
A Method for Making Three-Party Password-Based Key Exchange Resilient to Server Compromise. IIH-MSP 2007: 546-549 - [c3]Hongfeng Zhu, Tianhua Liu, Jie Liu, Guiran Chang:
An Efficient Client-to-Client Password-Authenticated Key Exchange Resilient to Server Compromise. PRDC 2007: 405-408 - 2006
- [c2]Hongfeng Zhu, Tianhua Liu, Chuansheng Zhou, Guiran Chang:
Research and Implementation of Zero-Copy Technology Based on Device Driver in Linux. IMSCCS (2) 2006: 129-134 - [c1]Tianhua Liu, Hongfeng Zhu, Chuansheng Zhou, Guiran Chang:
A New Method of TOE Architecture Based on the ML403 Development Board in Linux. IMSCCS (2) 2006: 160-166
Coauthor Index
aka: Tian-Hua Liu
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:13 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint