关注
Haibo Hong
Haibo Hong
Zhejiang Gongshang University
在 mail.zjgsu.edu.cn 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Prediction of rising stars in the game of cricket
H Ahmad, A Daud, L Wang, H Hong, H Dawood, Y Yang
IEEE Access 5, 4104-4124, 2017
572017
A CP-ABE scheme based on multi-authority in hybrid clouds for mobile devices
M Xie, Y Ruan, H Hong, J Shao
Future Generation Computer Systems 121, 114-122, 2021
402021
A certificateless verifiable strong designated verifier signature scheme
S Han, M Xie, B Yang, R Lu, H Bao, J Lin, HB Hong, MX Gu, S Han
IEEE Access 7, 126391-126408, 2019
192019
A secure trust-based key distribution with self-healing for internet of things
S Han, M Gu, B Yang, J Lin, H Hong, M Kong
IEEE Access 7, 114060-114076, 2019
182019
Construction of DNA codes by using algebraic number theory
H Hong, L Wang, H Ahmad, J Li, Y Yang, C Wu
Finite Fields and Their Applications 37, 328-343, 2016
172016
A new secure encryption scheme based on group factorization problem
Y Cong, H Hong, J Shao, S Han, J Lin, S Zhao
IEEE Access 7, 168728-168735, 2019
152019
Primitives towards verifiable computation: a survey
H Ahmad, L Wang, H Hong, J Li, H Dawood, M Ahmed, Y Yang
Frontiers of Computer Science 12, 451-478, 2018
142018
A Digital Signature Scheme Based on MST3 Cryptosystems
H Hong, J Li, L Wang, Y Yang, X Niu
Mathematical Problems in Engineering 2014 (1), 630421, 2014
132014
A novel blockchain-based and proxy-oriented public audit scheme for low performance terminal devices
M Xie, Q Zhao, H Hong, C Chen, J Yu
Journal of Parallel and Distributed Computing 169, 58-71, 2022
122022
Minimal logarithmic signatures for the unitary group
H Hong, L Wang, Y Yang
Designs, Codes and Cryptography 77, 179-191, 2015
82015
All exceptional groups of lie type have minimal logarithmic signatures
H Hong, L Wang, Y Yang, H Ahmad
Applicable Algebra in Engineering, Communication and Computing 25, 287-296, 2014
82014
Cyclic preparation of two-qubit state in two noisy environments
YR Sun, XB Chen, J Shao, S Han, H Hong, H Bao, Y Yang
Quantum Information Processing 21 (1), 40, 2022
72022
Public Key Encryption in Non-Abelian Groups
H Hong, J Shao, L Wang, H Ahmad, Y Yang
arXiv preprint arXiv:1605.06608, 2016
42016
Minimal logarithmic signatures for sporadic groups
H Hong, L Wang, H Ahmad, J Li, Y Yang
arXiv preprint arXiv:1507.01162, 2015
42015
A CCA secure public key encryption scheme based on finite groups of Lie type
H Hong, J Shao, L Wang, M Xie, G Wei, Y Yang, S Han, J Lin
Information Sciences 65 (119102), 1-119102, 2022
32022
Anti-Backdoor Model: A Novel Algorithm To Remove Backdoors in a Non-invasive Way
C Chen, H Hong, T Xiang, M Xie
IEEE Transactions on Information Forensics and Security, 2024
22024
A novel verifiable chinese multi-keyword fuzzy rank searchable encryption scheme in cloud environments
M Xie, X Yang, H Hong, G Wei, Z Zhang
Future Generation Computer Systems 153, 287-300, 2024
22024
A blockchain-based proxy oriented cloud storage public audit scheme for low-performance terminal devices
M Xie, Q Zhao, H Hong
International Conference on Algorithms and Architectures for Parallel …, 2021
22021
A novel protection method of continuous location sharing based on local differential privacy and conditional random field
L Zhu, H Hong, M Xie
International Conference on Algorithms and Architectures for Parallel …, 2021
22021
A Miniature CCA public key encryption scheme based on non-abelian factorization problem in finite groups of lie type
H Hong, L Wang, J Shao, J Yan, H Ahmad, G Wei, M Xie, Y Yang
The Computer Journal 62 (12), 1840-1848, 2019
22019
系统目前无法执行此操作,请稍后再试。
文章 1–20