default search action
Dong Zheng 0001
Person information
- affiliation: Xi'an University of Posts and Telecommunications, National Engineering Laboratory for Wireless Security, China
- affiliation (former): Shanghai Jiao Tong University, School of Information Security Engineering, China
- affiliation (PhD 1999): Xidian University, Xi'an, China
Other persons with the same name
- Dong Zheng — disambiguation page
- Dong Zheng 0002 — Advanced Video Systems, Communication Research Centre Canada, Ottawa, Canada (and 1 more)
- Dong Zheng 0003 (aka: Zheng Dong 0001) — Shandong University, School of School of Information Science and Engineering, Qingdao, China (and 4 more)
- Dong Zheng 0004 — Broadcom Corporation, Sunnyvale, CA, USA (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j101]Haiyan Xiu, Fang Ren, Xinglong Xue, Dong Zheng:
An Efficient Code-Based One-Time Blind Signature Scheme for Electronic Forensics. IET Inf. Secur. 2024(1) (2024) - [j100]Chengzhe Lai, Hanyue Zhang, Rongxing Lu, Dong Zheng:
Privacy-Preserving Medical Data Sharing Scheme Based on Two-Party Cloud-Assisted PSI. IEEE Internet Things J. 11(9): 15855-15868 (2024) - [j99]Qiuxia Zhao, Chan Gao, Dong Zheng, Yafei Li, Xiaokun Zheng:
Covert Communication in a Multirelay-Assisted Wireless Network With an Active Warden. IEEE Internet Things J. 11(9): 16450-16460 (2024) - [j98]Gang Han, Le Li, Baodong Qin, Dong Zheng:
Pairing-free Proxy Re-Encryption scheme with Equality Test for data security of IoT. J. King Saud Univ. Comput. Inf. Sci. 36(6): 102105 (2024) - [j97]Chan Gao, Bin Yang, Dong Zheng, Xiaohong Jiang, Tarik Taleb:
Cooperative Jamming and Relay Selection for Covert Communications in Wireless Relay Systems. IEEE Trans. Commun. 72(2): 1020-1032 (2024) - [j96]Qinglan Zhao, Pan Li, Dong Zheng, Luyang Li, Baodong Qin:
Further construction of even-variable balanced rotation symmetric Boolean functions with optimal algebraic immunity. Theor. Comput. Sci. 1012: 114731 (2024) - [j95]Rui Guo, Ruihan Dong, Xiong Li, Yinghui Zhang, Dong Zheng:
DRCLAS: An efficient certificateless aggregate signature scheme with dynamic revocation in vehicular ad-hoc networks. Veh. Commun. 47: 100763 (2024) - [c46]Chengzhe Lai, Xinwei Zhang, Haodi Zhang, Guanjie Li, Yong Yu, Dong Zheng:
GAN Augmentation-Based Continuous Authentication for Vehicular Digital Twin. ICC 2024: 5220-5225 - [c45]Linying Tian, Chan Gao, Dong Zheng, Qiuxia Zhao, Yu Shi:
Covert Communication for UAV-Assisted Wireless Systems with Probabilistic Jamming. NaNA 2024: 222-228 - [i10]Chan Gao, Linying Tian, Dong Zheng:
Covert Communication for Untrusted UAV-Assisted Wireless Systems. CoRR abs/2403.09475 (2024) - 2023
- [j94]Le Li, Dong Zheng, Haoyu Zhang, Baodong Qin:
Data Secure De-Duplication and Recovery Based on Public Key Encryption With Keyword Search. IEEE Access 11: 28688-28698 (2023) - [j93]Qinglan Zhao, Mengran Li, Zhixiong Chen, Baodong Qin, Dong Zheng:
A unified construction of weightwise perfectly balanced Boolean functions. Discret. Appl. Math. 337: 190-201 (2023) - [j92]Wei Liu, Yinghui Zhang, Gang Han, Jin Cao, Hui Cui, Dong Zheng:
Secure and Efficient Smart Healthcare System Based on Federated Learning. Int. J. Intell. Syst. 2023: 1-12 (2023) - [j91]Yajun Fan, Baodong Qin, Dong Zheng:
A lattice-based designated-server public-key authenticated encryption with keyword search. J. Syst. Archit. 145: 103031 (2023) - [j90]Qian Wang, Chengzhe Lai, Rongxing Lu, Dong Zheng:
Searchable Encryption With Autonomous Path Delegation Function and Its Application in Healthcare Cloud. IEEE Trans. Cloud Comput. 11(1): 879-896 (2023) - [j89]Chengzhe Lai, Yixiao Ma, Rongxing Lu, Yinghui Zhang, Dong Zheng:
A Novel Authentication Scheme Supporting Multiple User Access for 5G and Beyond. IEEE Trans. Dependable Secur. Comput. 20(4): 2970-2987 (2023) - [j88]Qian Wang, Chengzhe Lai, Gang Han, Dong Zheng:
pdRide: Privacy-Preserving Distributed Online Ride-Hailing Matching Scheme. IEEE Trans. Intell. Transp. Syst. 24(11): 12491-12505 (2023) - [c44]Yinghui Zhang, Hao Du, Jin Cao, Gang Han, Dong Zheng:
DP-Loc: A Differential Privacy-Based Indoor Localization Scheme with Bilateral Privacy Protection. Inscrypt (2) 2023: 293-304 - [c43]Chengzhe Lai, Meng Li, Guanjie Li, Dong Zheng:
Efficient Group Authentication and Key Agreement Scheme for Vehicular Digital Twin. ICCC 2023: 1-6 - [c42]Chengzhe Lai, Hao Wang, Haoyan Ma, Dong Zheng:
Blockchain-based Multi-Factor Group Authentication in Metaverse. ICCC 2023: 1-6 - [c41]Qili Guo, Chengzhe Lai, Haoyan Ma, Dong Zheng:
A Group-oriented Authentication Scheme for IoT Devices in 5G Networks. MSN 2023: 699-706 - [i9]Chan Gao, Bin Yang, Dong Zheng, Xiaohong Jiang, Tarik Taleb:
Cooperative Jamming and Relay Selection for Covert Communications. CoRR abs/2303.07770 (2023) - [i8]Qinglan Zhao, Mengran Li, Zhixiong Chen, Baodong Qin, Dong Zheng:
A unified construction of weightwise perfectly balanced Boolean functions. IACR Cryptol. ePrint Arch. 2023: 460 (2023) - 2022
- [j87]Xiaokun Zheng, Yanqi Zhao, Huilin Li, Ruonan Chen, Dong Zheng:
Blockchain-based verifiable privacy-preserving data classification protocol for medical data. Comput. Stand. Interfaces 82: 103605 (2022) - [j86]Qian Zhou, Chengzhe Lai, Qili Guo, Haoyan Ma, Dong Zheng:
A novel privacy protection scheme for internet of things based on blockchain and privacy set intersection technique. J. Cloud Comput. 11: 93 (2022) - [j85]Yinghui Zhang, Xuanni Wei, Jin Cao, Jianting Ning, Zuobin Ying, Dong Zheng:
Blockchain-Enabled decentralized Attribute-Based access control with policy hiding for smart healthcare. J. King Saud Univ. Comput. Inf. Sci. 34(10 Part A): 8350-8361 (2022) - [j84]Chengzhe Lai, Zhe Ma, Rui Guo, Dong Zheng:
Secure medical data sharing scheme based on traceable ring signature and blockchain. Peer-to-Peer Netw. Appl. 15(3): 1562-1576 (2022) - [j83]Guanjie Li, Chengzhe Lai, Rongxing Lu, Dong Zheng:
SecCDV: A Security Reference Architecture for Cybertwin-Driven 6G V2X. IEEE Trans. Veh. Technol. 71(5): 4535-4550 (2022) - [c40]Yifei Li, Yinghui Zhang, Wei Liu, Jianting Ning, Dong Zheng:
A Collaborative Access Control Scheme Based on Incentive Mechanisms. CSS 2022: 48-55 - [c39]Chengzhe Lai, Menghua Wang, Dong Zheng:
SPDT: Secure and Privacy-Preserving Scheme for Digital Twin-based Traffic Control. ICCC 2022: 144-149 - 2021
- [j82]Yinghui Zhang, Axin Wu, Zhenwei Chen, Dong Zheng, Jin Cao, Xiaohong Jiang:
Flexible and anonymous network slicing selection for C-RAN enabled 5G service authentication. Comput. Commun. 166: 165-173 (2021) - [j81]Yinghui Zhang, Robert H. Deng, Shengmin Xu, Jianfei Sun, Qi Li, Dong Zheng:
Attribute-based Encryption for Cloud Computing Access Control: A Survey. ACM Comput. Surv. 53(4): 83:1-83:41 (2021) - [j80]Chengzhe Lai, Guanjie Li, Dong Zheng:
SPSC: A secure and privacy-preserving autonomous platoon setup and communication scheme. Trans. Emerg. Telecommun. Technol. 32(9) (2021) - [j79]Rui Guo, Geng Yang, Huixian Shi, Yinghui Zhang, Dong Zheng:
O3-R-CP-ABE: An Efficient and Revocable Attribute-Based Encryption Scheme in the Cloud-Assisted IoMT System. IEEE Internet Things J. 8(11): 8949-8963 (2021) - [j78]Chengzhe Lai, Qian Li, Haibo Zhou, Dong Zheng:
SRSP: A Secure and Reliable Smart Parking Scheme With Dual Privacy Preservation. IEEE Internet Things J. 8(13): 10619-10630 (2021) - [j77]Chengzhe Lai, Yangyang Du, Qili Guo, Dong Zheng:
A trust-based privacy-preserving friend matching scheme in social Internet of Vehicles. Peer-to-Peer Netw. Appl. 14(4): 2011-2025 (2021) - [j76]Huimin Wang, Dong Zheng, Qinglan Zhao:
Publicly Verifiable Outsourcing Computation for QR Decomposition Based on Blockchain. Secur. Commun. Networks 2021: 6632518:1-6632518:12 (2021) - [j75]Yinghui Zhang, Robert H. Deng, Elisa Bertino, Dong Zheng:
Robust and Universal Seamless Handover Authentication in 5G HetNets. IEEE Trans. Dependable Secur. Comput. 18(2): 858-874 (2021) - [j74]Yinghui Zhang, Robert H. Deng, Ximeng Liu, Dong Zheng:
Outsourcing Service Fair Payment Based on Blockchain and Its Applications in Cloud Computing. IEEE Trans. Serv. Comput. 14(4): 1152-1166 (2021) - [c38]Baodong Qin, Xue Bai, Dong Zheng, Hui Cui, Yiyuan Luo:
Forward-Secure Revocable Identity-Based Encryption. ICICS (2) 2021: 321-340 - [c37]Baodong Qin, Hui Cui, Xiaokun Zheng, Dong Zheng:
Improved Security Model for Public-Key Authenticated Encryption with Keyword Search. ProvSec 2021: 19-38 - 2020
- [j73]Baodong Qin, Ximeng Liu, Zhuo Wei, Dong Zheng:
Space efficient revocable IBE for mobile devices in cloud computing. Sci. China Inf. Sci. 63(3) (2020) - [j72]Yinghui Zhang, Tiantian Zhang, Shengmin Xu, Guowen Xu, Dong Zheng:
Revocable and certificateless public auditing for cloud storage. Sci. China Inf. Sci. 63(10): 1-3 (2020) - [j71]Rui Guo, Chaoyuan Zhuang, Huixian Shi, Yinghui Zhang, Dong Zheng:
A lightweight verifiable outsourced decryption of attribute-based encryption scheme for blockchain-enabled wireless body area network in fog computing. Int. J. Distributed Sens. Networks 16(2) (2020) - [j70]Yinghui Zhang, Xinwei Ma, Axin Wu, Fangyuan Ren, Dong Zheng:
An Efficient Mobile Location-based Service Framework for Resource-constrained Devices. Int. J. Netw. Secur. 22(4): 698-707 (2020) - [j69]Chencheng Hu, Dong Zheng, Rui Guo, Axin Wu, Liang Wang, Shiyao Gao:
A Novel Blockchain-based Anonymous Handover Authentication Scheme in Mobile Networks. Int. J. Netw. Secur. 22(5): 874-884 (2020) - [j68]Chengzhe Lai, Min Zhang, Jie Cao, Dong Zheng:
SPIR: A Secure and Privacy-Preserving Incentive Scheme for Reliable Real-Time Map Updates. IEEE Internet Things J. 7(1): 416-428 (2020) - [j67]Baodong Qin, Yu Chen, Qiong Huang, Ximeng Liu, Dong Zheng:
Public-key authenticated encryption with keyword search revisited: Security model and constructions. Inf. Sci. 516: 515-528 (2020) - [j66]Chengzhe Lai, Rongxing Lu, Dong Zheng, Xuemin Sherman Shen:
Security and Privacy Challenges in 5G-Enabled Vehicular Networks. IEEE Netw. 34(2): 37-45 (2020) - [j65]Dong Zheng, Liang Xue, Chao Yu, Yannan Li, Yong Yu:
Toward Assured Data Deletion in Cloud Storage. IEEE Netw. 34(3): 101-107 (2020) - [j64]Rui Guo, Xiong Li, Dong Zheng, Yinghui Zhang:
An attribute-based encryption scheme with multiple authorities on hierarchical personal health record in cloud. J. Supercomput. 76(7): 4884-4903 (2020) - [j63]Dong Zheng, Baodong Qin, Yannan Li, Aikui Tian:
Cloud-Assisted Attribute-Based Data Sharing with Efficient User Revocation in the Internet of Things. IEEE Wirel. Commun. 27(3): 18-23 (2020) - [j62]Tianyu Chi, Baodong Qin, Dong Zheng:
An Efficient Searchable Public-Key Authenticated Encryption for Cloud-Assisted Medical Internet of Things. Wirel. Commun. Mob. Comput. 2020: 8816172:1-8816172:11 (2020) - [c36]Chengzhe Lai, Jinke Wan, Dong Zheng:
Dual Privacy-Preserving Health Data Aggregation Scheme Assisted by Medical Edge Computing. ICCC 2020: 154-159 - [c35]Zhenwei Chen, Yinghui Zhang, Gang Han, Jiangyong He, Rui Guo, Dong Zheng:
Cloud-Assisted Privacy Protection for Data Retrieval Against Keyword Guessing Attacks. ML4CS (1) 2020: 307-316
2010 – 2019
- 2019
- [j61]Baodong Qin, Dong Zheng:
Generic Approach to Outsource the Decryption of Attribute-Based Encryption in Cloud Computing. IEEE Access 7: 42331-42342 (2019) - [j60]Rui Guo, Huixian Shi, Dong Zheng, Chunming Jing, Chaoyuan Zhuang, Zhengyang Wang:
Flexible and Efficient Blockchain-Based ABE Scheme With Multi-Authority for Medical on Demand in Telemedicine System. IEEE Access 7: 88012-88025 (2019) - [j59]Yinghui Zhang, Chen Chen, Dong Zheng, Rui Guo, Shengmin Xu:
Shared Dynamic Data Audit Supporting Anonymous User Revocation in Cloud Storage. IEEE Access 7: 113832-113843 (2019) - [j58]Yinghui Zhang, Fangyuan Ren, Axin Wu, Tiantian Zhang, Jin Cao, Dong Zheng:
Certificateless Multi-Party Authenticated Encryption for NB-IoT Terminals in 5G Networks. IEEE Access 7: 114721-114730 (2019) - [j57]Shiyao Gao, Dong Zheng, Rui Guo, Chunming Jing, Chencheng Hu:
An Anti-Quantum E-Voting Protocol in Blockchain With Audit Function. IEEE Access 7: 115304-115316 (2019) - [j56]Dong Zheng, Chunming Jing, Rui Guo, Shiyao Gao, Liang Wang:
A Traceable Blockchain-Based Access Authentication System With Privacy Preservation in VANETs. IEEE Access 7: 117716-117726 (2019) - [j55]Axin Wu, Yinghui Zhang, Xiaokun Zheng, Rui Guo, Qinglan Zhao, Dong Zheng:
Efficient and privacy-preserving traceable attribute-based encryption in blockchain. Ann. des Télécommunications 74(7-8): 401-411 (2019) - [j54]Yinghui Zhang, Axin Wu, Tiantian Zhang, Dong Zheng:
Secure and flexible keyword search over encrypted data with outsourced decryption in Internet of things. Ann. des Télécommunications 74(7-8): 413-421 (2019) - [j53]Luyang Li, Dong Zheng, Qinglan Zhao:
Construction of Resilient Boolean and Vectorial Boolean Functions with High Nonlinearity. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 102-A(10): 1397-1401 (2019) - [j52]Qinglan Zhao, Dong Zheng, Baodong Qin, Rui Guo:
Constructions of 2-Rotation Symmetric Semi-Bent Functions with Degree Bigger than 2. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 102-A(11): 1497-1503 (2019) - [j51]Yinghui Zhang, Menglei Yang, Dong Zheng, Tiantian Zhang, Rui Guo, Fang Ren:
Leakage-Resilient Hierarchical Identity-Based Encryption with Recipient Anonymity. Int. J. Found. Comput. Sci. 30(4): 665-681 (2019) - [j50]Yinghui Zhang, Jiangang Shu, Ximeng Liu, Jin Li, Dong Zheng:
Comments on "A Large-Scale Concurrent Data Anonymous Batch Verification Scheme for Mobile Healthcare Crowd Sensing". IEEE Internet Things J. 6(1): 1287-1290 (2019) - [j49]Baodong Qin, Qinglan Zhao, Dong Zheng, Hui Cui:
(Dual) server-aided revocable attribute-based encryption with decryption key exposure resistance. Inf. Sci. 490: 74-92 (2019) - [j48]Yinghui Zhang, Tiantian Zhang, Rui Guo, Shengmin Xu, Dong Zheng:
Traceable Dynamic Public Auditing with Identity Privacy Preserving for Cloud Storage. KSII Trans. Internet Inf. Syst. 13(11): 5653-5672 (2019) - [j47]Fang Ren, Xuefei Yang, Dong Zheng:
A QC-LDPC Code Based Digital Signature Algorithm. J. Inf. Sci. Eng. 35(5): 1061-1074 (2019) - [j46]Xuefei Yang, Dong Zheng, Fang Ren:
一种基于QC-LDPC码的数字签名算法 (Digital Signature Algorithm Based on QC-LDPC Code). 计算机科学 46(6): 162-167 (2019) - [j45]Qinglan Zhao, Shuntong Yang, Dong Zheng, Baodong Qin:
A QR Code Secret Hiding Scheme against Contrast Analysis Attack for the Internet of Things. Secur. Commun. Networks 2019: 8105787:1-8105787:8 (2019) - [j44]Yinghui Zhang, Robert H. Deng, Dong Zheng, Jin Li, Pengfei Wu, Jin Cao:
Efficient and Robust Certificateless Signature for Data Crowdsensing in Cloud-Assisted Industrial IoT. IEEE Trans. Ind. Informatics 15(9): 5099-5108 (2019) - [c34]Chengzhe Lai, Yangyang Du, Jiawei Men, Dong Zheng:
A Trust-based Real-time Map Updating Scheme. ICCC 2019: 334-339 - 2018
- [j43]Rui Guo, Huixian Shi, Qinglan Zhao, Dong Zheng:
Secure Attribute-Based Signature Scheme With Multiple Authorities for Blockchain in Electronic Health Records Systems. IEEE Access 6: 11676-11686 (2018) - [j42]Dong Zheng, Axin Wu, Yinghui Zhang, Qinglan Zhao:
Efficient and Privacy-Preserving Medical Data Sharing in Internet of Things With Limited Computing Power. IEEE Access 6: 28019-28027 (2018) - [j41]Yinghui Zhang, Robert H. Deng, Jiangang Shu, Kan Yang, Dong Zheng:
TKSE: Trustworthy Keyword Search Over Encrypted Data With Two-Side Verifiability via Blockchain. IEEE Access 6: 31077-31087 (2018) - [j40]Yinghui Zhang, Dong Zheng, Rui Guo, Qinglan Zhao:
Fine-Grained Access Control Systems Suitable for Resource-Constrained Users in Cloud Computing. Comput. Informatics 37(2): 327-348 (2018) - [j39]Gang Han, Hui Li, Baodong Qin, Dong Zheng:
Chameleon all-but-one extractable hash proof and its applications. Sci. China Inf. Sci. 61(9): 099103:1-099103:3 (2018) - [j38]Baodong Qin, Qinglan Zhao, Dong Zheng:
Bounded Revocable and Outsourceable ABE for Secure Data Sharing. Comput. J. 61(8): 1259-1268 (2018) - [j37]Qinglan Zhao, Dong Zheng, Weiguo Zhang:
Constructions of rotation symmetric bent functions with high algebraic degree. Discret. Appl. Math. 251: 15-29 (2018) - [j36]Yinghui Zhang, Dong Zheng, Robert H. Deng:
Security and Privacy in Smart Health: Efficient Policy-Hiding Attribute-Based Access Control. IEEE Internet Things J. 5(3): 2130-2145 (2018) - [j35]Yinghui Zhang, Robert H. Deng, Ximeng Liu, Dong Zheng:
Blockchain based efficient and robust fair payment for outsourcing services in cloud computing. Inf. Sci. 462: 262-277 (2018) - [j34]Yinghui Zhang, Axin Wu, Dong Zheng:
Efficient and privacy-aware attribute-based data sharing in mobile cloud computing. J. Ambient Intell. Humaniz. Comput. 9(4): 1039-1048 (2018) - [j33]Yinghui Zhang, Jin Li, Dong Zheng, Ping Li, Yangguang Tian:
Privacy-preserving communication and power injection over vehicle networks and 5G smart grid slice. J. Netw. Comput. Appl. 122: 50-60 (2018) - [j32]Yinghui Zhang, Robert H. Deng, Gang Han, Dong Zheng:
Secure smart health with privacy-aware aggregate authentication and access control in Internet of Things. J. Netw. Comput. Appl. 123: 89-100 (2018) - [j31]Ming Yan, Yinghui Zhang, Dong Zheng, Liudi Lv, Haonan Su:
灵活访问且模糊可搜索的EHR云服务系统 (Flexibly Accessed and Vaguely Searchable EHR Cloud Service System). 计算机科学 45(10): 172-177 (2018) - [j30]Chengzhe Lai, Wenlong Guo, Yafei Li, Dong Zheng:
SEIP: Secure and seamless IP communications for group-oriented machine to machine communications. Peer-to-Peer Netw. Appl. 11(5): 821-836 (2018) - [j29]Yinghui Zhang, Pengzhen Lang, Dong Zheng, Menglei Yang, Rui Guo:
A Secure and Privacy-Aware Smart Health System with Secret Key Leakage Resilience. Secur. Commun. Networks 2018: 7202598:1-7202598:13 (2018) - [j28]Yinghui Zhang, Haonan Su, Menglei Yang, Dong Zheng, Fang Ren, Qinglan Zhao:
Secure Deduplication Based on Rabin Fingerprinting over Wireless Sensing Data in Cloud Computing. Secur. Commun. Networks 2018: 9081814:1-9081814:12 (2018) - [j27]Axin Wu, Dong Zheng, Yinghui Zhang, Menglei Yang:
Hidden Policy Attribute-Based Data Sharing with Direct Revocation and Keyword Search in Cloud Computing. Sensors 18(7): 2158 (2018) - [j26]Yinghui Zhang, Jiangfan Zhao, Dong Zheng, Kaixin Deng, Fangyuan Ren, Xiaokun Zheng, Jiangang Shu:
Privacy-Preserving Data Aggregation against False Data Injection Attacks in Fog Computing. Sensors 18(8): 2659 (2018) - [j25]Yinghui Zhang, Menglei Yang, Dong Zheng, Pengzhen Lang, Axin Wu, Chen Chen:
Efficient and secure big data storage system with leakage resilience in cloud computing. Soft Comput. 22(23): 7763-7772 (2018) - [j24]Chengzhe Lai, Dong Zheng, Qinglan Zhao, Xiaohong Jiang:
SEGM: A secure group management framework in integrated VANET-cellular networks. Veh. Commun. 11: 33-45 (2018) - [c33]Dong Zheng, Kaixin Deng, Yinghui Zhang, Jiangfan Zhao, Xiaokun Zheng, Xinwei Ma:
Smart Grid Power Trading Based on Consortium Blockchain in Internet of Things. ICA3PP (3) 2018: 453-459 - [c32]Yinghui Zhang, Jiangfan Zhao, Dong Zheng, Kaixin Deng, Fangyuan Ren, Xiaokun Zheng:
Privacy-Aware Data Collection and Aggregation in IoT Enabled Fog Computing. ICA3PP (4) 2018: 581-590 - [c31]Fang Ren, Xuefei Yang, Dong Zheng:
A QC-LDPC Code Based Digital Signature Algorithm. NaNA 2018: 257-262 - 2017
- [j23]Qinglan Zhao, Dong Zheng:
Two classes of rotation symmetric semi-bent functions. Sci. China Inf. Sci. 60(6): 068103:1-068103:3 (2017) - [j22]Qinglan Zhao, Dong Zheng, Xiangxue Li, Yinghui Zhang, Xiaoli Dong:
Characterizing Linear Structures of Boolean Functions from Arithmetic Walsh Transform. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 100-A(9): 1965-1972 (2017) - [j21]Fang Ren, Dong Zheng, WeiJing Wang:
An Efficient Code Based Digital Signature Algorithm. Int. J. Netw. Secur. 19(6): 1072-1079 (2017) - [j20]Junyao Ye, Dong Zheng, Fang Ren:
改进的具有轻量级结构的Veron身份认证及数字签名方案 (Improved Veron's Identification with Lightweight Structure and Digital Signature Scheme). 计算机科学 44(3): 168-174 (2017) - [j19]Yinghui Zhang, Jiangfan Zhao, Dong Zheng:
Efficient and Privacy-Aware Power Injection over AMI and Smart Grid Slice in Future 5G Networks. Mob. Inf. Syst. 2017: 3680671:1-3680671:11 (2017) - [j18]Yinghui Zhang, Jin Li, Dong Zheng, Xiaofeng Chen, Hui Li:
Towards privacy protection and malicious behavior traceability in smart health. Pers. Ubiquitous Comput. 21(5): 815-830 (2017) - [j17]Gang Han, Yu Yu, Xiangxue Li, Qifeng Zhou, Dong Zheng, Hui Li:
1-Resilient Boolean Functions on Even Variables with Almost Perfect Algebraic Immunity. Secur. Commun. Networks 2017: 6268230:1-6268230:9 (2017) - [c30]Baodong Qin, Qinglan Zhao, Dong Zheng, Hui Cui:
Server-Aided Revocable Attribute-Based Encryption Resilient to Decryption Key Exposure. CANS 2017: 504-514 - [c29]Haonan Su, Dong Zheng, Yinghui Zhang:
An Efficient and Secure Deduplication Scheme Based on Rabin Fingerprinting in Cloud Storage. CSE/EUC (1) 2017: 833-836 - [c28]Yinghui Zhang, Dong Zheng:
Anonymous Attribute-Based Encryption with Large Universe and Threshold Access Structures. CSE/EUC (1) 2017: 870-874 - [c27]Runhe Li, Dong Zheng, Yinghui Zhang, Haonan Su, Menglei Yang, Pengzhen Lang:
Attribute-Based Encryption with Multi-keyword Search. DSC 2017: 172-177 - [c26]Rui Guo, Xiong Li, Dong Zheng:
Privacy-Preserving Medical Information Systems Using Multi-authority Content-Based Encryption in Cloud. ICCCS (2) 2017: 268-279 - [c25]Yinghui Zhang, Dong Zheng, Qinglan Zhao, Chengzhe Lai, Fang Ren:
PADA: Privacy-Aware Data Aggregation with Efficient Communication for Power Injection in 5G Smart Grid Slice. NaNA 2017: 11-16 - [c24]Chengzhe Lai, Rongxing Lu, Dong Zheng:
Achieving Secure and Seamless IP Communications for Group-Oriented Software Defined Vehicular Networks. WASA 2017: 356-368 - 2016
- [j16]Chengzhe Lai, Rongxing Lu, Dong Zheng, Hui Li, Xuemin (Sherman) Shen:
GLARM: Group-based lightweight authentication scheme for resource-constrained machine to machine communications. Comput. Networks 99: 66-81 (2016) - [j15]Yinghui Zhang, Dong Zheng, Xiaofeng Chen, Jin Li, Hui Li:
Efficient attribute-based data sharing in mobile clouds. Pervasive Mob. Comput. 28: 135-149 (2016) - [j14]Yinghui Zhang, Dong Zheng, Qi Li, Jin Li, Hui Li:
Online/offline unbounded multi-authority attribute-based encryption for data sharing in mobile cloud computing. Secur. Commun. Networks 9(16): 3688-3702 (2016) - [j13]Chengzhe Lai, Rongxing Lu, Dong Zheng:
SPGS: a secure and privacy-preserving group setup framework for platoon-based vehicular cyber-physical systems. Secur. Commun. Networks 9(16): 3854-3867 (2016) - [j12]Chengzhe Lai, Rongxing Lu, Hui Li, Dong Zheng, Xuemin (Sherman) Shen:
Secure machine-type communications in LTE networks. Wirel. Commun. Mob. Comput. 16(12): 1495-1509 (2016) - [c23]Yinghui Zhang, Jin Li, Dong Zheng, Xiaofeng Chen, Hui Li:
Accountable Large-Universe Attribute-Based Encryption Supporting Any Monotone Access Structures. ACISP (1) 2016: 509-524 - [c22]Hang Liu, Dong Zheng, Qinglan Zhao:
Construction of Boolean Functions with Optimal Algebraic Immunity. BWCCA 2016: 791-798 - [c21]Yinghui Zhang, Dong Zheng:
Efficient and Expressive Anonymous Attribute-Based Encryption for Mobile Cloud Computing. BWCCA 2016: 807-814 - 2015
- [j11]Chengzhe Lai, Rongxing Lu, Dong Zheng, Hui Li, Xuemin (Sherman) Shen:
Toward secure large-scale machine-to-machine comm unications in 3GPP networks: chall enges and solutions. IEEE Commun. Mag. 53(12): 12-19 (2015) - [j10]Fang Ren, Dong Zheng:
深空网络的高效安全通信机制 (Efficient and Secure Communication Scheme for Deep Space Networks). 计算机科学 42(12): 229-232 (2015) - [c20]Chengzhe Lai, Rongxing Lu, Dong Zheng:
SGSA: Secure Group Setup and Anonymous Authentication in Platoon-Based Vehicular Cyber-Physical Systems. WASA 2015: 274-283 - 2014
- [j9]Xiangxue Li, Qingji Zheng, Haifeng Qian, Dong Zheng, Kefei Chen:
PWG: Progressive Weight-Growth Algorithm for LDPC Codes. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 97-A(2): 685-689 (2014) - [c19]Jiantao Wang, Zheng Huang, Dong Zheng, Qiang Li:
An application of newton formula on the computation of finite field trace. ICIA 2014: 137-140 - [c18]Yinghui Zhang, Dong Zheng, Xiaofeng Chen, Jin Li, Hui Li:
Computationally Efficient Ciphertext-Policy Attribute-Based Encryption with Constant-Size Ciphertexts. ProvSec 2014: 259-273 - 2012
- [i7]Qiang Li, Xiangxue Li, Dong Zheng, Kefei Chen:
Optimal Multiple Assignments with (m, m)-Scheme for General Access Structures. IACR Cryptol. ePrint Arch. 2012: 7 (2012) - [i6]Qiang Li, Xiangxue Li, Dong Zheng, Zheng Huang, Kefei Chen:
On the Equivalence between the Set Covering Problem and the Problem of Finding Optimal Cumulative Assignment Schemes. IACR Cryptol. ePrint Arch. 2012: 245 (2012) - 2011
- [c17]Bozhong Liu, Zheng Gong, Weidong Qiu, Dong Zheng:
On the Security of 4-Bit Involutive S-Boxes for Lightweight Designs. ISPEC 2011: 247-256 - [c16]Zheng Huang, Qiang Li, Dong Zheng, Kefei Chen, Xiangxue Li:
YI Cloud: Improving user privacy with secret key recovery in cloud storage. SOSE 2011: 268-272 - 2010
- [j8]Xiangxue Li, Weidong Qiu, Dong Zheng, Kefei Chen, Jianhua Li:
Anonymity Enhancement on Robust and Efficient Password-Authenticated Key Agreement Using Smart Cards. IEEE Trans. Ind. Electron. 57(2): 793-800 (2010) - [c15]Qingji Zheng, Xiangxue Li, Dong Zheng, Baoan Guo:
Regular Quasi-cyclic LDPC Codes with Girth 6 from Prime Fields. IIH-MSP 2010: 470-473
2000 – 2009
- 2009
- [j7]Xiangxue Li, Dong Zheng, Kefei Chen, Jianhua Li:
Democratic group signatures with collective traceability. Comput. Electr. Eng. 35(5): 664-672 (2009) - [j6]Xiangxue Li, Qingji Zheng, Haifeng Qian, Dong Zheng, Jianhua Li:
Toward optimizing cauchy matrix for cauchy reed-solomon code. IEEE Commun. Lett. 13(8): 603-605 (2009) - [j5]Wei Han, Kefei Chen, Dong Zheng:
Receipt-Freeness for Groth e-Voting Schemes. J. Inf. Sci. Eng. 25(2): 517-530 (2009) - [c14]Zhiheng Zhou, Xiangxue Li, Dong Zheng, Kefei Chen, Jianhua Li:
Extended PEG Algorithm for High Rate LDPC Codes. ISPA 2009: 494-498 - [c13]Chaonian Guo, Xiangxue Li, Dong Zheng, Shengli Liu, Jianhua Li:
AE-BP: Adaptive Erasure Belief Propagation Decoding Algorithm of LDPC Codes. NCM 2009: 479-483 - 2008
- [j4]Zheng Gong, Xiangxue Li, Dong Zheng, Kefei Chen:
A Generic Construction for Instrusion-Resilient Signatures from Linear Feedback Shift Register. J. Inf. Sci. Eng. 24(5): 1347-1360 (2008) - [c12]Jian Weng, Shengli Liu, Kefei Chen, Dong Zheng, Weidong Qiu:
Identity-Based Threshold Key-Insulated Encryption without Random Oracles. CT-RSA 2008: 203-220 - [c11]Wei Han, Tao Hao, Dong Zheng, Kefei Chen, Xiaofeng Chen:
A Tamper-Evident Voting Machine Resistant to Covert Channels. ProvSec 2008: 335-344 - [i5]Dong Zheng, Xiangxue Li, Changshe Ma, Kefei Chen, Jianhua Li:
Democratic Group Signatures with Threshold Traceability. IACR Cryptol. ePrint Arch. 2008: 112 (2008) - 2007
- [j3]Xiangxue Li, Dong Zheng, Kefei Chen:
LFSR-based Signatures with Message Recovery. Int. J. Netw. Secur. 4(3): 266-270 (2007) - [j2]Dong Zheng, Xiangxue Li, Kefei Chen:
Code-based Ring Signature Scheme. Int. J. Netw. Secur. 5(2): 154-157 (2007) - [c10]Xiangxue Li, Dong Zheng, Kefei Chen:
Efficient Blind Signatures from Linear Feedback Shift Register. CDVE 2007: 423-425 - [c9]Dong Zheng, Xiangxue Li, Kefei Chen, Jianhua Li:
Linkable Ring Signatures from Linear Feedback Shift Register. EUC Workshops 2007: 716-727 - [c8]Xiangxue Li, Dong Zheng, Kefei Chen:
Efficient Linkable Ring Signatures and Threshold Signatures from Linear Feedback Shift Register. ICA3PP 2007: 95-106 - [c7]Han Wei, Dong Zheng, Kefei Chen:
A Receipt-Free Punch-Hole Ballot Electronic Voting Scheme. SITIS 2007: 355-360 - [i4]Changshe Ma, Jian Weng, Dong Zheng:
Fast Digital Signature Schemes as Secure as Diffie-Hellman Assumptions. IACR Cryptol. ePrint Arch. 2007: 19 (2007) - [i3]Wei Han, Dong Zheng, Kefei Chen:
Filling the Gap between Voters and Cryptography in e-Voting. IACR Cryptol. ePrint Arch. 2007: 266 (2007) - 2006
- [i2]Wei Han, Dong Zheng, Kefei Chen:
Some Remarks on the TKIP Key Mixing Function of IEEE 802.11i. IACR Cryptol. ePrint Arch. 2006: 129 (2006) - 2005
- [c6]Yongguo Liu, Wei Zhang, Dong Zheng, Kefei Chen:
A Novel Clustering Technique Based on Improved Noising Method. CIARP 2005: 81-92 - [c5]Yongguo Liu, Dong Zheng, Shiqun Li, Libin Wang, Kefei Chen:
A Tabu Clustering Method with DHB Operation and Mergence and Partition Operation. Discovery Science 2005: 380-382 - [c4]Longjun Zhang, Han Wei, Dong Zheng, Kefei Chen:
A Security Solution of WLAN Based on Public Key Cryptosystem. ICPADS (2) 2005: 422-427 - [c3]Changshe Ma, Kefei Chen, Dong Zheng, Shengli Liu:
Efficient and Proactive Threshold Signcryption. ISC 2005: 233-243 - [c2]Changshe Ma, Kefei Chen, Shengli Liu, Dong Zheng:
Transitive Signatures Based on Bilinear Maps. WOSIS 2005: 48-56 - 2004
- [c1]Dong Zheng, Huang Zheng, Kefei Chen, Weidong Kou:
ID-Based Proxy Blind Signature. AINA (2) 2004: 380-383 - [i1]Lizhen Yang, Xiaoyun Wang, Dong Zheng, Kefei Chen:
Yet another attack on a password authentication scheme based on quadratic residues with parameters unknown 1. IACR Cryptol. ePrint Arch. 2004: 50 (2004) - 2002
- [j1]Dong Zheng, Kefei Chen, Jinyuan You:
Multiparty Authentication Services and Key Agreement Protocols with Semi-Trusted Third Party. J. Comput. Sci. Technol. 17(6): 749-756 (2002)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-14 22:18 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint