Name
Affiliation
Papers
HONG ZHONG
School of Computer Science and Technology, Anhui University, Hefei, China 230039
37
Collaborators
Citations 
PageRank 
63
90
18.46
Referers 
Referees 
References 
269
865
345
Search Limit
100865
Title
Citations
PageRank
Year
Reliable and Efficient Content Sharing for 5G-Enabled Vehicular Networks10.352022
Differentially Private Double Auction with Reliability-Aware in Mobile Crowd Sensing10.342021
Fair Auctioning And Trading Framework For Cloud Virtual Machines Based On Blockchain10.352021
Secure data sharing scheme for VANETs based on edge computing30.392019
Publicly-Verifiable Proofs of Storage Based on the Discrete Logarithm Problem00.342019
PATH: privacy-preserving auction for heterogeneous spectrum allocations00.342019
Differentially Private Location Protection with Continuous Time Stamps for VANETs.00.342018
Differentially Private Double Spectrum Auction with Approximate Social Welfare Maximization.10.352018
PP-MCSA: Privacy Preserving Multi-channel Double Spectrum Auction.00.342018
Identity-Based Proofs of Storage with Enhanced Privacy.00.342018
Conditional Privacy-Preserving Authentication Using Registration List in Vehicular Ad Hoc Networks.60.442018
Multi-authority attribute-based encryption access control scheme with policy hidden for cloud storage.220.652018
A novel quantum scheme for secure two-party distance computation.10.432017
Privacy-preserving point-inclusion protocol for an arbitrary area based on phase-encoded quantum private query.10.392017
LEPA: A Lightweight and Efficient Public Auditing Scheme for Cloud-Assisted Wireless Body Sensor Networks.20.352017
An Efficient ID-based Online/Offline Signature Scheme without Key Escrow.00.342017
Towards Secure and Verifiable Database-Driven Spectrum Sharing00.342017
Cooperative Query Answer Authentication Scheme Over Anonymous Sensing Data.00.342017
On Privacy-Preserving Cloud Auction.00.342016
Keyword search protocol with privacy preservation using ID-based proxy reencryption.00.342016
Non-repudiable Query Answer Authentication Scheme over Anonymous Cloud Data00.342016
Insecurity of a Certificate-free Ad Hoc Anonymous Authentication.00.342016
An efficient quantum scheme for Private Set Intersection50.522016
A Novel Authenticated Group Key Distribution Scheme.00.342016
Many-to-one homomorphic encryption scheme30.382016
Efficient extensible conditional privacy-preserving authentication scheme supporting batch verification for VANETs60.452016
Towards secure spectrum auction: both bids and bidder locations matter: poster.00.342016
Quantum private set intersection cardinality and its application to anonymous authentication.30.432016
An Improved Identity-Based Multi-Proxy Multi-Signature Scheme.00.342016
A Lightweight and Secure Data Authentication Scheme with Privacy Preservation for Wireless Sensor Networks.00.342016
Comments on two schemes of identity-based user authentication and key agreement for mobile client---server networks30.482015
A novel one‐to‐many and many‐to‐one asymmetric encryption model and its algorithms00.342015
A New AES S-Box Equation System Based on BES.00.342015
An Efficient SDN Load Balancing Scheme Based on Variance Analysis for Massive Mobile Users.10.392015
A novel anonymous authentication scheme without cryptography10.352014
Multi-party quantum state sharing of an arbitrary two-qubit state with Bell states183.892011
Asymmetric multi-party quantum state sharing of an arbitrary m-qubit state111.462011