default search action
Sufang Zhou
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j10]Sufang Zhou, Jianing Fan, Ke Yuan, Xiaoyu Du, Chunfu Jia:
Efficient privacy-preserving online medical pre-diagnosis based on blockchain. J. Supercomput. 81(1): 111 (2025) - 2024
- [j9]Xiaoyi Yang, Yanqi Zhao, Sufang Zhou, Lianhai Wang:
A lightweight delegated private set intersection cardinality protocol. Comput. Stand. Interfaces 87: 103760 (2024) - [j8]Ke Yuan, Ziwei Cheng, Keyan Chen, Bozhen Wang, Junyang Sun, Sufang Zhou, Chunfu Jia:
Multiple time servers timed-release encryption based on Shamir secret sharing for EHR cloud system. J. Cloud Comput. 13(1): 116 (2024) - 2022
- [j7]Xiaoyu Du, Yinyin Li, Sufang Zhou, Yi Zhou:
ATS-LIA: A lightweight mutual authentication based on adaptive trust strategy in flying ad-hoc networks. Peer-to-Peer Netw. Appl. 15(4): 1979-1993 (2022) - [c3]Sufang Zhou, Mingzhe Liao, Baojun Qiao, Xiaobo Yang:
A Survey of Security Aggregation. ICACT 2022: 334-340 - 2021
- [j6]Ke Yuan, Yingjie Yan, Tong Xiao, Wenchao Zhang, Sufang Zhou, Chunfu Jia:
Privacy-Protection Scheme of a Credit-Investigation System Based on Blockchain. Entropy 23(12): 1657 (2021) - [c2]Wei Li, Menghan Ren, Yonglong Zhu, Yanyu Zhang, Sufang Zhou, Yi Zhou:
CC-BRRT: A Path Planning Algorithm Based on Central Circle Sampling Bidirectional RRT. WISA 2021: 430-441 - 2020
- [j5]Shundong Li, Sufang Zhou, Jiawei Dou, Wenli Wang:
Polynomial AND homomorphic cryptosystem and applications. Sci. China Inf. Sci. 63(1): 112105 (2020) - [c1]Yinyin Li, Xiaoyu Du, Sufang Zhou:
A lightweight identity authentication scheme for UAV and road base stations. CIAT 2020: 54-58
2010 – 2019
- 2019
- [j4]Yaling Geng, Shundong Li, Sufang Zhou:
Probabilistic RSA with Homomorphism and Its Applications. Int. J. Netw. Secur. 21(6): 1042-1053 (2019) - 2017
- [j3]Sufang Zhou, Shundong Li, Jiawei Dou, Yaling Geng, Xin Liu:
Efficient Secure Multiparty Subset Computation. Secur. Commun. Networks 2017: 9717580:1-9717580:11 (2017) - 2016
- [j2]Zhenhua Chen, Shundong Li, Qiong Huang, Yilei Wang, Sufang Zhou:
A restricted proxy re-encryption with keyword search for fine-grained data access control in cloud storage. Concurr. Comput. Pract. Exp. 28(10): 2858-2876 (2016) - [j1]Yimin Guo, Shundong Li, Jiawei Dou, Sufang Zhou:
Deterministic cloned tag detection protocol for anonymous radio-frequency identification systems. IET Inf. Secur. 10(1): 28-32 (2016)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-30 00:19 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint