Name
Playground
About
FAQ
GitHub
Playground
Shortest Path Finder
Community Detector
Connected Papers
Author Trending
Koh Aoki
Motoharu Sonogashira
Bhupendra Singh
David J. Westover
Yu-Wei Chang
Muhammad Mamdani
Zhijing Wu
Sebastian Magda
David MacDonald
Sumesh Divakaran
Home
/
Author
/
HONG ZHONG
Author Info
Open Visualization
Name
Affiliation
Papers
HONG ZHONG
School of Computer Science and Technology, Anhui University, Hefei, China 230039
37
Collaborators
Citations
PageRank
63
90
18.46
Referers
Referees
References
269
865
345
Search Limit
100
865
Publications (37 rows)
Collaborators (63 rows)
Referers (100 rows)
Referees (100 rows)
Title
Citations
PageRank
Year
Reliable and Efficient Content Sharing for 5G-Enabled Vehicular Networks
1
0.35
2022
Differentially Private Double Auction with Reliability-Aware in Mobile Crowd Sensing
1
0.34
2021
Fair Auctioning And Trading Framework For Cloud Virtual Machines Based On Blockchain
1
0.35
2021
Secure data sharing scheme for VANETs based on edge computing
3
0.39
2019
Publicly-Verifiable Proofs of Storage Based on the Discrete Logarithm Problem
0
0.34
2019
PATH: privacy-preserving auction for heterogeneous spectrum allocations
0
0.34
2019
Differentially Private Location Protection with Continuous Time Stamps for VANETs.
0
0.34
2018
Differentially Private Double Spectrum Auction with Approximate Social Welfare Maximization.
1
0.35
2018
PP-MCSA: Privacy Preserving Multi-channel Double Spectrum Auction.
0
0.34
2018
Identity-Based Proofs of Storage with Enhanced Privacy.
0
0.34
2018
Conditional Privacy-Preserving Authentication Using Registration List in Vehicular Ad Hoc Networks.
6
0.44
2018
Multi-authority attribute-based encryption access control scheme with policy hidden for cloud storage.
22
0.65
2018
A novel quantum scheme for secure two-party distance computation.
1
0.43
2017
Privacy-preserving point-inclusion protocol for an arbitrary area based on phase-encoded quantum private query.
1
0.39
2017
LEPA: A Lightweight and Efficient Public Auditing Scheme for Cloud-Assisted Wireless Body Sensor Networks.
2
0.35
2017
An Efficient ID-based Online/Offline Signature Scheme without Key Escrow.
0
0.34
2017
Towards Secure and Verifiable Database-Driven Spectrum Sharing
0
0.34
2017
Cooperative Query Answer Authentication Scheme Over Anonymous Sensing Data.
0
0.34
2017
On Privacy-Preserving Cloud Auction.
0
0.34
2016
Keyword search protocol with privacy preservation using ID-based proxy reencryption.
0
0.34
2016
Non-repudiable Query Answer Authentication Scheme over Anonymous Cloud Data
0
0.34
2016
Insecurity of a Certificate-free Ad Hoc Anonymous Authentication.
0
0.34
2016
An efficient quantum scheme for Private Set Intersection
5
0.52
2016
A Novel Authenticated Group Key Distribution Scheme.
0
0.34
2016
Many-to-one homomorphic encryption scheme
3
0.38
2016
Efficient extensible conditional privacy-preserving authentication scheme supporting batch verification for VANETs
6
0.45
2016
Towards secure spectrum auction: both bids and bidder locations matter: poster.
0
0.34
2016
Quantum private set intersection cardinality and its application to anonymous authentication.
3
0.43
2016
An Improved Identity-Based Multi-Proxy Multi-Signature Scheme.
0
0.34
2016
A Lightweight and Secure Data Authentication Scheme with Privacy Preservation for Wireless Sensor Networks.
0
0.34
2016
Comments on two schemes of identity-based user authentication and key agreement for mobile client---server networks
3
0.48
2015
A novel one‐to‐many and many‐to‐one asymmetric encryption model and its algorithms
0
0.34
2015
A New AES S-Box Equation System Based on BES.
0
0.34
2015
An Efficient SDN Load Balancing Scheme Based on Variance Analysis for Massive Mobile Users.
1
0.39
2015
A novel anonymous authentication scheme without cryptography
1
0.35
2014
Multi-party quantum state sharing of an arbitrary two-qubit state with Bell states
18
3.89
2011
Asymmetric multi-party quantum state sharing of an arbitrary m-qubit state
11
1.46
2011
1