default search action
Jianhong Zhang
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j76]Jiangqi Long, Min Zhou, Yinghao Hu, Jianhong Zhang:
Design of an Asymmetric Damping Structure for a Single Cylinder and Single Rod MR Damper. IEEE Access 12: 123823-123834 (2024) - [j75]Jianhong Zhang, Jie Wei, Jianan Zhang, Cao Bo:
CKAA: Certificateless key-agreement authentication scheme in digital twin telemedicine environment. Trans. Emerg. Telecommun. Technol. 35(1) (2024) - [j74]Jianhong Zhang, Xinyan Cui:
LBCSC: Lattice-based chameleon signcryption scheme for secure and privacy-preserving vehicular communications. Trans. Emerg. Telecommun. Technol. 35(10) (2024) - [j73]Jianhong Zhang, Chenghe Dong, Yining Liu:
Efficient Pairing-Free Certificateless Signcryption Scheme for Secure Data Transmission in IoMT. IEEE Internet Things J. 11(3): 4348-4361 (2024) - [j72]Jianhong Zhang, Jie Wei:
PFDAM: Privacy-Preserving Fine-Grained Data Aggregation Scheme Supporting Multifunctionality in Smart Grid. IEEE Internet Things J. 11(15): 25520-25533 (2024) - [j71]Jianhong Zhang, Chenghe Dong:
On the Security of Lightweight and Escrow-Free Certificate-Based Data Aggregation for Smart Grid. IEEE Trans. Dependable Secur. Comput. 21(3): 1242-1243 (2024) - [j70]Chenghe Dong, Jianhong Zhang:
On the Security of Multi-Receiver Certificateless Generalized Signcryption Scheme for WBANs. IEEE Trans. Dependable Secur. Comput. 21(4): 4302-4303 (2024) - [j69]Jianhong Zhang, Jie Wei:
On the Security of Privacy-Enhanced Authentication Protocol for Federated Learning in VANETs. IEEE Trans. Inf. Forensics Secur. 19: 9433-9435 (2024) - [c79]Jianhong Zhang, Chuming Shi, Jie Wei:
Short Ciphertext-Size Privacy-Preserving Aggregation Against Malicious Aggregators. ICIC (5) 2024: 501-512 - 2023
- [j68]Jianhong Zhang, Haowei Yang:
A Privacy-Preserving Remote Heart Rate Abnormality Monitoring System. IEEE Access 11: 97089-97098 (2023) - [j67]Yu Zhou, Shuo Gao, Mingwei Sun, Yajing Zhou, Zengqiang Chen, Jianhong Zhang:
Recognizing Chaos by Deep Learning and Transfer Learning on Recurrence Plots. Int. J. Bifurc. Chaos 33(10): 2350116:1-2350116:13 (2023) - [j66]Xuefeng Zhang, Jianhong Zhang:
Classification and topic tracking of college students' cybersecurity education based on the internet. J. Comput. Methods Sci. Eng. 23(6): 3363-3373 (2023) - [j65]Jianhong Zhang, Chenghe Dong:
Privacy-preserving data aggregation scheme against deletion and tampering attacks from aggregators. J. King Saud Univ. Comput. Inf. Sci. 35(4): 100-111 (2023) - [j64]Jianhong Zhang, Haoting Hao, Hongwei Su:
SE-P²μm: Secure and Efficient Privacy-Preserving User-Profile Matching Protocol for Social Networks. IEEE Trans. Comput. Soc. Syst. 10(6): 3295-3307 (2023) - [j63]Jianhong Zhang, Qijia Zhang:
Comment on "Secure and Lightweight Conditional Privacy-Preserving Authentication for Securing Traffic Emergency Messages in VANETs". IEEE Trans. Inf. Forensics Secur. 18: 1037-1038 (2023) - [j62]Jianhong Zhang, Chenghe Dong:
Secure and Lightweight Data Aggregation Scheme for Anonymous Multi-Receivers in WBAN. IEEE Trans. Netw. Sci. Eng. 10(1): 81-91 (2023) - [c78]Jianhong Zhang, Jie Ma, Jinxiao Yuan, Shaohua Wang:
Multi-mode signal fusion and improved residual dense network fault diagnosis of nuclear power plant. SAFEPROCESS 2023: 1-6 - [c77]Jianhong Zhang, Jianan Zhang, Zongyi Lv, Ruxuan Zhang:
On the Security of Privacy-preserving Data Aggregation Scheme Based on CRT in Mobile Crowdsensing System. CyberC 2023: 331-334 - [c76]Chenghe Dong, Jianhong Zhang, Zongyi Lv, Ruxuan Zhang:
Lightweight Hierarchical Deterministic Wallet Supporting Stealth Address for IoT. TrustCom 2023: 387-393 - 2022
- [j61]Jianhong Zhang, Min Wang, Keming Yang, Bing Wu, Yaxing Li, Yanru Li, Qianqian Han:
Predicting Copper and Lead Concentration in Crops Using Reflectance Spectroscopy Associated With Intrinsic Wavelength-Scale Decomposition Spectral Transformation. IEEE Access 10: 52258-52272 (2022) - [j60]Wenle Bai, Zhongjun Yang, Jianhong Zhang:
Corrigendum to "Randomization-Based Dynamic Programming Offloading Algorithm for Mobile Fog Computing". Secur. Commun. Networks 2022: 9879521:1-9879521:1 (2022) - [j59]Jianhong Zhang, Haoting Han:
A Lightweight and Privacy-Friendly Data Aggregation Scheme against Abnormal Data. Sensors 22(4): 1452 (2022) - [c75]Jianhong Zhang, Chenghe Dong, Ziang Li, Sentian Yin, Lidong Han:
On the Security of Verifiable Privacy-preserving Multi-type Data Aggregation Scheme in Smart Grid. CyberC 2022: 9-11 - 2021
- [j58]Jianhong Zhang, Menglong Wu:
Efficient Cloud-Based Private Set Intersection Protocol with Hidden Access Attribute and Integrity Verification. Secur. Commun. Networks 2021: 3963037:1-3963037:13 (2021) - [j57]Wenle Bai, Zhongjun Yang, Jianhong Zhang, Rajiv Kumar:
Randomization-Based Dynamic Programming Offloading Algorithm for Mobile Fog Computing. Secur. Commun. Networks 2021: 4348511:1-4348511:9 (2021) - [c74]Xi Cui, Mengjie Liu, Na Zhang, Jianhong Zhang, Na Wei, Ke Li:
Brain functional networks analysis of five fingers grasping in virtual reality environment. EMBC 2021: 804-807 - [c73]Manli Zhang, Jianhong Zhang, Zhiwu Lu, Tao Xiang, Mingyu Ding, Songfang Huang:
IEPT: Instance-Level and Episode-Level Pretext Tasks for Few-Shot Learning. ICLR 2021 - [c72]Jianhong Zhang, Menglong Wu, Qijia Zhang, Chenggen Peng:
A lightweight Data Sharing Scheme with Resisting Key Abuse in Mobile Edge Computing. INFOCOM Workshops 2021: 1-6 - [c71]Jianhong Zhang, Manli Zhang, Zhiwu Lu, Tao Xiang:
AdarGCN: Adaptive Aggregation GCN for Few-Shot Learning. WACV 2021: 3481-3490 - 2020
- [j56]Hongmei Luo, Jun Qian, Zhichao Xu, Wanjing Liu, Lei Xu, Ying Li, Jiang Xu, Jianhong Zhang, Xiaolan Xu, Chang Liu, Liu He, Jianqin Li, Chao Sun, Francis Martin, Jingyuan Song, Shilin Chen:
The Wolfiporia cocos Genome and Transcriptome Shed Light on the Formation of Its Edible and Medicinal Sclerotium. Genom. Proteom. Bioinform. 18(4): 455-467 (2020) - [j55]Jianhong Zhang, Wenle Bai, Zhengtao Jiang:
On the Security of a Practical Constant-Size Ring Signature Scheme. Int. J. Netw. Secur. 22(3): 392-396 (2020) - [j54]Jianhong Zhang, Qijia Zhang, Shenglong Ji:
A Fog-Assisted Privacy-Preserving Task Allocation in Crowdsourcing. IEEE Internet Things J. 7(9): 8331-8342 (2020) - [j53]Jianhong Zhang, Wenle Bai, Xianmin Wang:
Identity-based data storage scheme with anonymous key generation in fog computing. Soft Comput. 24(8): 5561-5571 (2020) - [c70]Jianhong Zhang, Ke Li, Leitong Lin, Boqiang Liu, Na Wei:
Hand-oriented tasking assessment of fine movement control deficits in Alzheimer's Disease. CISP-BMEI 2020: 862-866 - [i4]Jianhong Zhang, Manli Zhang, Zhiwu Lu, Tao Xiang, Ji-Rong Wen:
AdarGCN: Adaptive Aggregation GCN for Few-Shot Learning. CoRR abs/2002.12641 (2020)
2010 – 2019
- 2019
- [j52]Jianhong Zhang, Wenle Bai, Yuehai Wang:
Non-Interactive ID-Based Proxy Re-Signature Scheme for IoT Based on Mobile Edge Computing. IEEE Access 7: 37865-37875 (2019) - [j51]Jianhong Zhang, Zhengtao Jiang:
Identity-and-data privacy forward security public auditing protocol in the standard model. Int. J. Commun. Syst. 32(15) (2019) - [j50]Jianhong Zhang, Hongxin Meng:
Genuine and secure public auditing for the outsourced data in cloud. Int. J. High Perform. Comput. Netw. 14(2): 183-196 (2019) - [j49]Li Liu, Jianhong Zhang, Xiaodong Fu, Lijun Liu, Qingsong Huang:
Unsupervised segmentation and elm for fabric defect image classification. Multim. Tools Appl. 78(9): 12421-12449 (2019) - [j48]Jianhong Zhang, Peirong Ou:
Privacy-Preserving Multi-Receiver Certificateless Broadcast Encryption Scheme with De-Duplication. Sensors 19(15): 3370 (2019) - [j47]Jianhong Zhang:
Improvement of ID-based proxy re-signature scheme with pairing-free. Wirel. Networks 25(7): 4319-4329 (2019) - [c69]Jianhong Zhang, Ke Li, Leitong Lin, Boqiang Liu, Na Wei:
Effects of Alzheimer's Disease on Reach-to-Pinch Performance with Multimodal Sensory Feedbacks. CISP-BMEI 2019: 1-5 - [c68]Le Lv, Jianbo Cheng, Nanbo Peng, Min Fan, Dongbin Zhao, Jianhong Zhang:
Auto-encoder based Graph Convolutional Networks for Online Financial Anti-fraud. CIFEr 2019: 1-6 - [c67]Yulei Niu, Hanwang Zhang, Manli Zhang, Jianhong Zhang, Zhiwu Lu, Ji-Rong Wen:
Recursive Visual Attention in Visual Dialog. CVPR 2019: 6679-6688 - [c66]Guangzhen Liu, Jiechao Guan, Manli Zhang, Jianhong Zhang, Zihao Wang, Zhiwu Lu:
Joint Projection and Subspace Learning for Zero-Shot Recognition. ICME 2019: 1228-1233 - [c65]Yuqi Huo, Jiechao Guan, Jianhong Zhang, Manli Zhang, Ji-Rong Wen, Zhiwu Lu:
Zero-Shot Learning with Few Seen Class Samples. ICME 2019: 1336-1341 - 2018
- [j46]Jianhong Zhang, Jian Mao:
On the Security of a Pairing-Free Certificateless Signcryption Scheme. Comput. J. 61(4): 469-471 (2018) - [j45]Jianhong Zhang, Xubing Zhao, Weina Zhen:
S2PAD: secure self-certified public auditing for data integrity in cloud storage and its extension. Int. J. Inf. Commun. Technol. 12(1/2): 113-130 (2018) - [c64]Qianjia Huang, Diana Inkpen, Jianhong Zhang, David Van Bruwaene:
Cyberbullying Intervention Based on Convolutional Neural Networks. TRAC@COLING 2018 2018: 42-51 - [c63]Jianhong Zhang, Peirong Ou, Wenle Bai:
On the Security of a Data Integrity Auditing Scheme in Mobile Multi-cloud Environment. ICCSP 2018: 40-44 - [i3]Yulei Niu, Hanwang Zhang, Manli Zhang, Jianhong Zhang, Zhiwu Lu, Ji-Rong Wen:
Recursive Visual Attention in Visual Dialog. CoRR abs/1812.02664 (2018) - 2017
- [j44]Xiao-dong Feng, Li-wei Li, Jianhong Zhang, Yun-ping Zhu, Cheng Chang, Kun-xian Shu, Jie Ma:
Using the entrapment sequence method as a standard to evaluate key steps of proteomics data analysis process. BMC Genom. 18(S2) (2017) - [j43]Jianhong Zhang, Hongxin Meng, Yong Yu:
Achieving public verifiability and data dynamics for cloud data in the standard model. Clust. Comput. 20(3): 2641-2653 (2017) - [j42]Jianhong Zhang, Jian Mao:
Anonymous multi-receiver broadcast encryption scheme with strong security. Int. J. Embed. Syst. 9(2): 177-187 (2017) - [j41]Jianhong Zhang, Xubing Zhao, Weina Zhen:
OGPADSM2: oriented-group public auditing for data sharing with multi-user modification. Int. J. High Perform. Comput. Netw. 10(3): 240-249 (2017) - [j40]Jianhong Zhang, Pengyan Li, Min Xu:
On the Security of an Mutual Verifiable Provable Data Auditing in Public Cloud Storage. Int. J. Netw. Secur. 19(4): 605-612 (2017) - [j39]Debiao He, Huaqun Wang, Jianhong Zhang, Lina Wang:
Insecurity of an identity-based public auditing protocol for the outsourced data in cloud storage. Inf. Sci. 375: 48-53 (2017) - [j38]Jian Mao, Wenqian Tian, Yan Zhang, Jian Cui, Hanjun Ma, Jingdong Bian, Jianwei Liu, Jianhong Zhang:
Co-Check: Collaborative Outsourced Data Auditing in Multicloud Environment. Secur. Commun. Networks 2017: 2948025:1-2948025:13 (2017) - [c62]Jianhong Zhang, Hao Xiao:
Public Auditing Scheme of Dynamic Data Sharing Suiting for Cloud-Based EHR System. CyberC 2017: 235-243 - 2016
- [j37]Jianhong Zhang, Xubing Zhao:
Efficient chameleon hashing-based privacy-preserving auditing in cloud storage. Clust. Comput. 19(1): 47-56 (2016) - [j36]Jianhong Zhang, Pengyan Li, Jian Mao:
IPad: ID-based public auditing for the outsourced data in the standard model. Clust. Comput. 19(1): 127-138 (2016) - [j35]Jianhong Zhang, Jian Mao:
Efficient public key encryption with revocable keyword search in cloud computing. Clust. Comput. 19(3): 1211-1217 (2016) - [j34]Jianhong Zhang, Qiaocui Dong:
Efficient ID-based public auditing for the outsourced data in cloud storage. Inf. Sci. 343-344: 1-14 (2016) - [j33]Jianhong Zhang, Jian Mao:
Efficient Multi-Proxy Signature Scheme with Short Length in the Standard Model. J. Inf. Sci. Eng. 32(4): 1097-1112 (2016) - [j32]Jianhong Zhang, Xubing Zhao, Jian Mao:
Attack on Chen et al.'s certificateless aggregate signature scheme. Secur. Commun. Networks 9(1): 54-59 (2016) - [c61]Jianhong Zhang, Shuai Liu, Jian Mao:
On the security of a dynamic-hash-table based public auditing protocol. CISP-BMEI 2016: 1954-1958 - [c60]Jianhong Zhang, Pengyan Li, Zhibin Sun, Jian Mao:
ID-based Data Integrity Auditing Scheme from RSA with Resisting Key Exposure. ProvSec 2016: 83-100 - [c59]Jianhong Zhang, Zhibin Sun, Shuai Liu, Pengyan Liu:
On the Security of a Threshold Anonymous Authentication Protocol for VANETs. SpaCCS 2016: 145-155 - [c58]Jian Mao, Jian Cui, Yan Zhang, Hanjun Ma, Jianhong Zhang:
Collaborative Outsourced Data Integrity Checking in Multi-Cloud Environment. WASA 2016: 511-523 - 2015
- [j31]Jianhong Zhang, Jian Mao:
An improved anonymous multi-receiver identity-based encryption scheme. Int. J. Commun. Syst. 28(4): 645-658 (2015) - [j30]Jianhong Zhang, Xubing Zhao, Cheng Ji:
A novel authenticated encryption scheme and its extension. Inf. Sci. 317: 196-201 (2015) - [j29]Jianhong Zhang, Xubing Zhao:
Privacy-Preserving Public Auditing Scheme for Shared Data with Supporting Multi-function. J. Commun. 10(7): 535-542 (2015) - [j28]Jianhong Zhang, Wenjing Tang:
On the security of Kim et al. two ID-based broadcast signcryption schemes. Secur. Commun. Networks 8(8): 1509-1514 (2015) - [c57]Jianhong Zhang, Xubing Zhao:
An efficient revocable certificateless signature scheme. FSKD 2015: 1852-1857 - [c56]Jianhong Zhang, Pengyan Li, Jian Mao:
An Oriented-Group Supporting Multi-user Public Auditing for Data Sharing. SmartCity 2015: 996-1002 - 2014
- [j27]Jianhong Zhang, Wenjing Tang, Jian Mao:
Efficient public verification proof of retrievability scheme in cloud. Clust. Comput. 17(4): 1401-1411 (2014) - [j26]Jianhong Zhang, Yong Yu:
Short computational Diffie-Hellman-based proxy signature scheme in the standard model. Int. J. Commun. Syst. 27(10): 1894-1907 (2014) - [j25]Jianhong Zhang, Yuwei Xu:
Privacy-preserving authentication protocols with efficient verification in VANETs. Int. J. Commun. Syst. 27(12): 3676-3692 (2014) - [j24]Jianhong Zhang, Min Xu, Liying Liu:
On the Security of a Secure Batch Verification with Group Testing for VANET. Int. J. Netw. Secur. 16(5): 355-362 (2014) - [c55]Jianhong Zhang, Weina Zeng:
Self-Certified Public Auditing for Data Integrity in Cloud Storage. 3PGCIC 2014: 267-273 - [c54]Jianhong Zhang, Weina Zhen:
Practical Preserving Identity-Privacy Anonymous Data Sharing in Cloud Computing. CSE 2014: 1629-1636 - [c53]Huan Du, Guoliang Fan, Jianqiang Yi, Jianhong Zhang, Jie Zhang:
Disturbance compensated adaptive backstepping control for an unmanned seaplane. ROBIO 2014: 1725-1730 - 2013
- [j23]Jianhong Zhang, Liying Liu, Yuanbo Cui, Zhipeng Chen:
SP2DAS: Self-certified PKC-Based Privacy-Preserving Data Aggregation Scheme in Smart Grid. Int. J. Distributed Sens. Networks 9 (2013) - [j22]Jianhong Zhang, Jian Mao, Yuwei Xu:
On the security of an ID-based anonymous proxy signature scheme and its improved scheme. Int. J. Embed. Syst. 5(3): 181-188 (2013) - [j21]Jianhong Zhang, Yuwei Xu, Jiancheng Zou:
Comment on Wang et al.'s anonymous multi-receiver ID-based encryption scheme and its improved schemes. Int. J. Intell. Inf. Database Syst. 7(5): 400-413 (2013) - [j20]Jianhong Zhang, Yuwei Xu, Zhipeng Chen:
Augmented Broadcaster Identity-based Broadcast Encryption. J. Digit. Inf. Manag. 11(3): 227-234 (2013) - [j19]Jianhong Zhang, Zhibin Sun:
An ID-Based Server-Aided Verification Short Signature Scheme Avoid Key Escrow. J. Inf. Sci. Eng. 29(3): 459-473 (2013) - [c52]Jianhong Zhang, Weina Zhen, Min Xu:
An Efficient Privacy-Preserving Authentication Protocol in VANETs. MSN 2013: 272-277 - 2012
- [j18]Jianhong Zhang, Jane Mao:
An efficient RSA-based certificateless signature scheme. J. Syst. Softw. 85(3): 638-642 (2012) - [c51]Jianhong Zhang, Yuwei Xu:
Breaking and Repairing of an Anonymous and Traceable Communication Protocol for Vehicular Ad Hoc Networks. CIT 2012: 88-93 - [c50]Jianhong Zhang, Yuwei Xu:
On the Security of an Enhanced ID-Based Anonymous Proxy Signature Scheme in ICCAE2010. INCoS 2012: 245-250 - [c49]Jianhong Zhang, Yuwei Xu:
Comment on Anonymous Multi-receiver Identity-Based Encryption Scheme. INCoS 2012: 473-476 - 2011
- [j17]Jianhong Zhang, Jian Mao:
Another Efficient Proxy Signature Scheme in the Standard Model. J. Inf. Sci. Eng. 27(4): 1249-1264 (2011) - [c48]Jianhong Zhang, Jianqiang Yi, Xiangmin Tan, Yi Yu:
Fuzzy control of a four-rope-driven level-adjustment robot considering all constrained situations. ACC 2011: 557-562 - [c47]Jianhong Zhang, Yuanbo Cui, Xi Wu:
Forgeability Attack of Two Special Signature Schemes. ICIC (1) 2011: 494-501 - [c46]Jianhong Zhang, Fenhong Guo, Zhibin Sun, Jilin Wang:
Forgeability Attack of Two DLP-Base Proxy Blind Signature Schemes. ICSI (2) 2011: 395-402 - 2010
- [j16]Jianhong Zhang, Hua Chen, Shengnan Gao:
Efficient Blind Signature Scheme based on Modified Generalized Bilinear Inversion for Multiple Signers. J. Digit. Content Technol. its Appl. 4(2): 142-148 (2010) - [j15]Jianhong Zhang, Min Xu, Xue Liu, Xiuna Su:
On the Security of Convertible Multiauthenticated Encryption Scheme and Its Improved Scheme. J. Digit. Content Technol. its Appl. 4(7): 190-196 (2010) - [j14]Jianhong Zhang, Chenglian Liu, Yixian Yang:
An efficient secure proxy verifiably encrypted signature scheme. J. Netw. Comput. Appl. 33(1): 29-34 (2010) - [c45]Jianhong Zhang, Xiuna Su:
An Efficient Signcryption Schemes Based from Bilinear Maps in the Standard Model. APSCC 2010: 447-453 - [c44]Jianhong Zhang, Xue Liu:
An Efficient Strong ID-Based Signature Scheme with Unforgeability. FCST 2010: 239-245 - [c43]Chenglian Liu, Jianhong Zhang, Shaoyi Deng:
Security Analysis of Liu-Li Digital Signature Scheme. FGIT-FGCN (2) 2010: 63-70 - [c42]Jianhong Zhang, Shengnan Gao:
Efficient Strong Fair Concurrent Signature Scheme. ICEE 2010: 1327-1330 - [c41]Jianhong Zhang, Jilin Wang:
A Controllable Anonymous Proxy Signature Scheme with Revocation. ICIC (2) 2010: 590-598 - [c40]Jianhong Zhang, Shengnan Gao:
Efficient provable certificateless blind signature scheme. ICNSC 2010: 292-297 - [c39]Jianhong Zhang, Hua Chen, Xue Liu, Chenglian Liu:
An Efficient Blind Ring Signature Scheme without Pairings. WAIM Workshops 2010: 177-188
2000 – 2009
- 2009
- [j13]Jianhong Zhang, Jian Mao:
A novel identity-based multi-signcryption scheme. Comput. Commun. 32(1): 14-18 (2009) - [j12]Jianhong Zhang, Yixian Yang, Xinxin Niu:
A Novel Identity-Based Multi-Signcryption Scheme. Int. J. Distributed Sens. Networks 5(1): 28 (2009) - [j11]Jianhong Zhang, Cheng Ji, Qin Geng:
Designated-Verifier Chameleon Proxy Signature. Int. J. Distributed Sens. Networks 5(1): 29 (2009) - [c38]Jianhong Zhang, Qin Geng:
Cryptoanalysis of Two Signcryption Schemes. IAS 2009: 65-68 - [c37]Yi Yu, Jianqiang Yi, Chengdong Li, Dongbin Zhao, Jianhong Zhang:
Control of a rope-driven self-leveling device for leveling adjustment. ACC 2009: 5115-5120 - [c36]Jianhong Zhang, Hua Chen, Qin Geng:
Efficient and Provably Secure Self-certified Signature Scheme. AMT 2009: 501-512 - [c35]Jianhong Zhang, Hua Chen, Shengnan Gao, Yixian Yang:
A Special Proxy Signature Scheme with Multi-warrant. ASIAN 2009: 147-157 - [c34]Jianhong Zhang, Hua Chen, Shengnan Gao:
On the Linkability and Security Analysis of Two Schnorr-Type Blind Signature Schemes. DASC 2009: 286-291 - [c33]Jianhong Zhang, Hua Chen, Shengnan Gao, Qin Geng:
Comment on a Digital Signature Scheme with Using Self-Certified Public Keys. IFITA (3) 2009: 678-680 - [c32]Yi Yu, Jianqiang Yi, Chengdong Li, Dongbin Zhao, Jianhong Zhang:
Fuzzy logic based adjustment control of a cable-driven auto-leveling parallel robot. IROS 2009: 2102-2107 - [c31]Jianhong Zhang, Yixian Yang, Xinxin Niu:
Efficient Provable Secure ID-Based Directed Signature Scheme without Random Oracle. ISNN (3) 2009: 318-327 - [c30]Jianhong Zhang:
On the Security of a Certificate-Based Signature Scheme and Its Improvement with Pairings. ISPEC 2009: 47-58 - [c29]Jianhong Zhang, Hua Chen:
Efficient Provable Secure ID-Based Anonymous Signcryption Scheme. PACCS 2009: 415-418 - [c28]Jianhong Zhang, Jianqiang Yi, Yi Yu:
Intelligent control of a four-rope-driven level-adjustment device with constrained outputs. ROBIO 2009: 1860-1865 - [c27]Jianhong Zhang, Yixian Yang, Xinxin Niu, Shengnan Gao, Hua Chen, Qin Geng:
An Improved Secure Identity-Based On-Line/Off-Line Signature Scheme. ISA 2009: 588-597 - [c26]Jianhong Zhang, Shengnan Gao, Hua Chen, Qin Geng:
A Novel ID-Based Anonymous Signcryption Scheme. APWeb/WAIM 2009: 604-610 - 2008
- [j10]Jianhong Zhang, Jane Mao:
A novel ID-based designated verifier signature scheme. Inf. Sci. 178(3): 766-773 (2008) - [c25]Jianhong Zhang, Qin Geng:
An Efficient Proxy Signature Scheme with Full-delegation. ICNSC 2008: 513-518 - [c24]Jianhong Zhang, Qin Geng:
On the Security of A Group Signature Scheme. ICNSC 2008: 1310-1314 - [c23]Jianhong Zhang, Cheng Ji:
On the Security of two Authenticated Encryption Schemes. ICNSC 2008: 1315-1319 - [c22]Jianhong Zhang, Jianjun Xie:
Security Analysis and their Improvement of Two Signature Schemes. ICYCS 2008: 1412-1417 - [c21]Jianhong Zhang, Qin Geng:
On the Security of Group Signature Scheme and Designated Verifier Signature Scheme. NAS 2008: 351-358 - 2007
- [j9]Jianhong Zhang, Wei Zou:
On the Security of Huang-Chang Multi-signature Schemes. Int. J. Netw. Secur. 5(1): 62-65 (2007) - [c20]Jianhong Zhang:
An Efficient Identity-Based Ring Signature Scheme and Its Extension. ICCSA (2) 2007: 63-74 - [c19]Jianhong Zhang, Jane Mao:
Security Analysis of Two Signature Schemes and Their Improved Schemes. ICCSA (1) 2007: 589-602 - [c18]Jianhong Zhang:
A verifiably encrypted signature scheme with strong unforgeability. Infoscale 2007: 66 - [c17]Jianhong Zhang, Jian Mao:
A Novel Verifiably Encrypted Signature Scheme Without Random Oracle. ISPEC 2007: 65-78 - [c16]Jianhong Zhang:
An Improved Designated-Verifier Proxy Signature Scheme. IEEE NAS 2007: 77-82 - 2006
- [c15]Jianhong Zhang, Jian Mao:
Linkability Analysis of Some Blind Signature Schemes. CIS 2006: 556-566 - [c14]Jianhong Zhang, Wei Zou:
A Robust Verifiably Encrypted Signature Scheme. EUC Workshops 2006: 731-740 - [c13]Jianhong Zhang, Tao Wei, Jianyu Zhang, Wei Zou:
Linkability of a Blind Signature Scheme and Its Improved Scheme. ICCSA (4) 2006: 262-270 - [c12]Jianhong Zhang, Wei Zou:
Linkability of Two Blind Signature Schemes. ICICIC (1) 2006: 468-471 - 2005
- [j8]Jianhong Zhang, Yumin Wang:
On the security of Miyaji et al. group signature scheme. Appl. Math. Comput. 167(2): 1373-1382 (2005) - [j7]Jianhong Zhang, Yumin Wang:
On the security of a convertible authenticated encryption. Appl. Math. Comput. 169(2): 1063-1069 (2005) - [j6]Jianhong Zhang, Yumin Wang:
Two provably secure k-out-of-n oblivious transfer schemes. Appl. Math. Comput. 169(2): 1211-1220 (2005) - [j5]Jianhong Zhang, Yumin Wang:
An improved signature scheme without using one-way Hash functions. Appl. Math. Comput. 170(2): 905-908 (2005) - [j4]Jianhong Zhang, Qianhong Wu:
An Improved Nominative Proxy Signature for Mobile Communication. IEICE Trans. Inf. Syst. 88-D(7): 1697-1699 (2005) - [j3]Jianhong Zhang, Wei Zou, Dan Chen, Yumin Wang:
On the Security of a Digital Signature with Message Recovery Using Self-certified Public Key. Informatica (Slovenia) 29(3): 243-346 (2005) - [j2]Jianhong Zhang, Qianhong Wu, Yumin Wang:
A New Efficient Group Signature With Forward Security. Informatica (Slovenia) 29(3): 321-326 (2005) - [c11]Yujie Mou, Jian Cao, Shen-sheng Zhang, Jianhong Zhang:
Interactive Web Service Choice-Making Based on Extended QoS Model. CIT 2005: 1130-1134 - [c10]Jianhong Zhang, Jiancheng Zou, Yumin Wang:
A Novel and Secure Non-designated Proxy Signature Scheme for Mobile Agents. ICCNMC 2005: 836-844 - [c9]Jianhong Zhang, Jiancheng Zou, Yumin Wang:
An Improved Group Signature Scheme. TrustBus 2005: 185-194 - [c8]Jianhong Zhang, Hu'an Li, Jilin Wang:
A Convertible Limited Verifier Signature Scheme. WAIM 2005: 638-644 - [i2]Jianhong Zhang, Wei Zou:
On the Security of A Group Signature Scheme. IACR Cryptol. ePrint Arch. 2005: 353 (2005) - 2004
- [j1]Jianhong Zhang, Qianhong Wu, Yumin Wang:
A New Efficient Group Signature With Forward Security. Informatica (Slovenia) 28(2): 153-157 (2004) - [c7]Jianhong Zhang, Shen-sheng Zhang, Jian Cao, Yujie Mou:
Improved HTN Planning Approach for Service Composition. IEEE SCC 2004: 609-612 - [c6]Jianhong Zhang, Qianhong Wu, Jilin Wang, Yumin Wang:
An Improved Nominative Proxy Signature Scheme for Mobile Communication. AINA (2) 2004: 23-26 - [c5]Zewen Chen, Jiwu Huang, Daren Huang, Jianhong Zhang, Yumin Wang:
Provably Secure and ID-Based Group Signature Scheme. AINA (2) 2004: 384-388 - [c4]Jianhong Zhang, Shen-sheng Zhang, Jian Cao:
Planning Based Service Composition System. PDCAT 2004: 878-881 - 2003
- [c3]Qianhong Wu, Jianhong Zhang, Yumin Wang:
Practical t-out-n Oblivious Transfer and Its Applications. ICICS 2003: 226-237 - [c2]Jianhong Zhang, Qianhong Wu, Yumin Wang:
A Novel Efficient Group Signature Scheme with Forward Security. ICICS 2003: 292-300 - [c1]Jianhong Zhang, Xiaofeng Chen, Yumin Wang:
Security analysis of the improved group signature. ITW 2003: 171-174 - 2002
- [i1]Jianhong Zhang, Jilin Wang, Yumin Wang:
two attacks on xia-you Group Signature. IACR Cryptol. ePrint Arch. 2002: 177 (2002)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 22:52 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint