Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Rongxing Lu - MaRDI portal

Rongxing Lu

From MaRDI portal
Person:849937

Available identifiers

zbMath Open lu.rongxingMaRDI QIDQ849937

List of research outcomes

PublicationDate of PublicationType
Towards privacy-preserving category-aware POI recommendation over encrypted LBSN data2024-04-30Paper
Efficient and privacy-preserving tree-based inference via additive homomorphic encryption2023-11-01Paper
Efficient and secure outsourcing of differentially private data publication2022-08-25Paper
Efficient privacy-preserving data merging and skyline computation over multi-source encrypted data2020-12-10Paper
A Markov adversary model to detect vulnerable iOS devices and vulnerabilities in iOS apps2019-03-27Paper
Secure and flexible cloud-assisted association rule mining over horizontally partitioned databases2017-09-07Paper
Comment on “An Efficient Homomorphic MAC with Small Key Size for Authentication in Network Coding”2017-05-16Paper
A Privacy-Preserving Outsourced Functional Computation Framework Across Large-Scale Multiple Encrypted Domains2017-05-16Paper
User Collusion Avoidance Scheme for Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption2017-05-16Paper
Proxy Re-encryption with Delegatable Verifiability2016-09-02Paper
RCCA-Secure Multi-use Bidirectional Proxy Re-encryption with Master Secret Security2015-09-29Paper
EFADS: efficient, flexible and anonymous data sharing protocol for cloud computing with proxy re-encryption2014-07-29Paper
Querying over Encrypted Data in Smart Grids2014-07-23Paper
Efficient ID-Based One-Time Proxy Signature and Its Application in E-Cheque2009-01-09Paper
A simple deniable authentication protocol based on the Diffie–Hellman algorithm2008-09-24Paper
Designing efficient proxy signature schemes for mobile communication2008-04-15Paper
New \((t, n)\) threshold directed signature scheme with provable security2008-01-11Paper
https://portal.mardi4nfdi.de/entity/Q54319332008-01-02Paper
https://portal.mardi4nfdi.de/entity/Q35942812007-08-07Paper
Password-based group key agreement protocol for client-server application2007-06-01Paper
An efficient provable secure ID-based proxy signature scheme based on CDH assumption2007-05-09Paper
An improved deniable authentication protocol2007-02-02Paper
Proofs of security for improved Rabin signature scheme2006-11-15Paper
An ID-based authenticated key agreement protocol for peer-to-peer computing2006-11-15Paper
A self-encryption remote user anonymous authentication scheme using smart cards2006-11-15Paper
Cryptology and Network Security2006-11-14Paper
https://portal.mardi4nfdi.de/entity/Q54697132006-05-26Paper
Designated verifier proxy signature scheme with message recovery2005-11-14Paper
Proxy signature scheme using self-certified public keys2005-11-14Paper
A new deniable authentication protocol from bilinear pairings2005-11-04Paper
Efficient remote user authentication scheme using smart card2005-10-10Paper
A robust \((k,n)+1\) threshold proxy signature scheme based on factoring2005-08-05Paper
Provably secure proxy-protected signature schemes based on factoring2005-05-04Paper
Proxy blind multi-signature scheme without a secure channel2005-05-04Paper
Threshold undeniable signature scheme based on conic2005-02-22Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Rongxing Lu