Παρακολούθηση
Bingsheng Zhang
Bingsheng Zhang
Η διεύθυνση ηλεκτρονικού ταχυδρομείου έχει επαληθευτεί στον τομέα zju.edu.cn
Τίτλος
Παρατίθεται από
Παρατίθεται από
Έτος
Privacy-assured outsourcing of image reconstruction service in cloud
C Wang, B Zhang, K Ren, JM Roveda
IEEE Transactions on Emerging Topics in Computing 1 (1), 166-177, 2013
1372013
SBVLC: Secure barcode-based visible light communication for smartphones
B Zhang, K Ren, G Xing, X Fu, C Wang
IEEE Transactions on Mobile Computing 15 (2), 432-446, 2016
1342016
Round-efficient oblivious database manipulation
S Laur, J Willemson, B Zhang
Information Security: 14th International Conference, ISC 2011, Xi’an, China …, 2011
1312011
End-to-end verifiable elections in the standard model
A Kiayias, T Zacharias, B Zhang
Advances in Cryptology-EUROCRYPT 2015: 34th Annual International Conference …, 2015
1252015
Linear (hull) and algebraic cryptanalysis of the block cipher PRESENT
J Nakahara, P Sepehrdad, B Zhang, M Wang
Cryptology and Network Security: 8th International Conference, CANS 2009 …, 2009
1042009
${\ssr {PriWhisper}} $: Enabling Keyless Secure Acoustic Communication for Smartphones
B Zhang, Q Zhan, S Chen, M Li, K Ren, C Wang, D Ma
IEEE internet of things journal 1 (1), 33-45, 2014
962014
Algebraic, AIDA/cube and side channel analysis of KATAN family of block ciphers
GV Bard, NT Courtois, J Nakahara, P Sepehrdad, B Zhang
Progress in Cryptology-INDOCRYPT 2010: 11th International Conference on …, 2010
712010
A privacy-aware cloud-assisted healthcare monitoring system via compressive sensing
C Wang, B Zhang, K Ren, JM Roveda, CW Chen, Z Xu
IEEE INFOCOM 2014-IEEE Conference on Computer Communications, 2130-2138, 2014
682014
A non-interactive range proof with constant communication
R Chaabouni, H Lipmaa, B Zhang
Financial Cryptography and Data Security: 16th International Conference, FC …, 2012
582012
D-DEMOS: A distributed, end-to-end verifiable, internet voting system
N Chondros, B Zhang, T Zacharias, P Diamantopoulos, S Maneas, ...
2016 IEEE 36th International Conference on Distributed Computing Systems …, 2016
532016
DEMOS-2: scalable E2E verifiable elections without random oracles
A Kiayias, T Zacharias, B Zhang
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
452015
A more efficient computationally sound non-interactive zero-knowledge shuffle argument
H Lipmaa, B Zhang
Journal of Computer Security 21 (5), 685-719, 2013
392013
A treasury system for cryptocurrencies: Enabling better collaborative intelligence
B Zhang, R Oliynykov, H Balogun
The Network and Distributed System Security Symposium 2019, 2019
382019
SoK: A Systematic Study of Anonymity in Cryptocurrencies
N Alsalami, B Zhang
2019 IEEE Conference on Dependable and Secure Computing (DSC), 1-9, 2019
372019
An efficient E2E verifiable e-voting system without setup assumptions
A Kiayias, T Zacharias, B Zhang
IEEE Security & Privacy, 2017
372017
Proof-carrying cloud computation: The case of convex optimization
Z Xu, C Wang, K Ren, L Wang, B Zhang
IEEE Transactions on Information Forensics and Security 9 (11), 1790-1803, 2014
362014
Towards everlasting privacy and efficient coercion resistance in remote electronic voting
P Grontas, A Pagourtzis, A Zacharakis, B Zhang
Financial Cryptography and Data Security: FC 2018 International Workshops …, 2019
342019
Generic constant-round oblivious sorting algorithm for MPC
B Zhang
Provable Security: 5th International Conference, ProvSec 2011, Xi’an, China …, 2011
332011
Time analyticity with higher norm estimates for the 2D Navier–Stokes equations
C Foias, MS Jolly, R Lan, R Rupam, Y Yang, B Zhang
IMA Journal of Applied Mathematics 80 (3), 766-810, 2014
232014
Uncontrolled randomness in blockchains: Covert bulletin board for illicit activity
N Alsalami, B Zhang
2020 IEEE/ACM 28th International Symposium on Quality of Service (IWQoS), 1-10, 2020
222020
Δεν είναι δυνατή η εκτέλεση της ενέργειας από το σύστημα αυτή τη στιγμή. Προσπαθήστε ξανά αργότερα.
Άρθρα 1–20