Name
Papers
Collaborators
ZHE XIA
22
52
Citations 
PageRank 
Referers 
19
8.17
75
Referees 
References 
291
112
Search Limit
100291
Title
Citations
PageRank
Year
Novel Generic Construction Of Leakage-Resilient Pke Scheme With Cca Security00.342021
Face Template Protection through Residual Learning Based Error-Correcting Codes.00.342021
Non-Interactive Integrated Membership Authentication And Group Arithmetic Computation Output For 5g Sensor Networks00.342021
Lightweight And Flexible Key Distribution Schemes For Secure Group Communications00.342021
Novel Public-Key Encryption with Continuous Leakage Amplification00.342021
A Federated Learning Assisted Conditional Privacy Preserving Scheme for Vehicle Networks.00.342021
Lightweight group key distribution schemes based on pre-shared pairwise keys00.342020
A Generic Construction of CCA-Secure Deterministic Encryption00.342020
Continuous Leakage-Resilient Certificate-Based Encryption Scheme Without Bilinear Pairings00.342020
Security Analysis of a Multi-secret Sharing Scheme with Unconditional Security.00.342020
Identity-based encryption with leakage-amplified chosen-ciphertext attacks security.00.342020
Improvement of Attribute-Based Encryption Using Blakley Secret Sharing.00.342020
Privacy-preserving raw data collection without a trusted authority for IoT.40.412019
A secure data sharing scheme with cheating detection based on Chaum-Pedersen protocol for cloud storage.00.342019
Development of an Early Warning System for Network Intrusion Detection Using Benford's Law Features.00.342019
An alternative approach to public cloud data auditing supporting data dynamics10.352019
A Cheating Detectable Privacy-Preserving Data Sharing Scheme for Cloud Computing.00.342018
Continuous leakage-resilient access control for wireless sensor networks10.342018
A secure data backup scheme using multi-factor authentication.70.432017
How to Share Secret Efficiently over Networks.10.362017
Provably Secure Threshold Paillier Encryption Based on Hyperplane Geometry.20.372016
Testing Voters' Understanding of a Security Mechanism Used in Verifiable Voting.30.842013