Calculated based on number of publications stored in Pure and citations from Scopus
20042024

Research activity per year

Filter
Conference contribution

Search results

  • 2013

    A novel audio information hiding scheme based on rMAC

    Yu, L., Zhu, L., Liu, D. & Xie, Y., 2013, Proceedings of the 2012 International Conference on Information Technology and Software Engineering - Software Engineering and Digital Media Technology. p. 895-902 8 p. (Lecture Notes in Electrical Engineering; vol. 212 LNEE).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Citation (Scopus)
  • Enhanced privacy preserving pattern-code based data aggregation in wireless sensor networks

    Ntirenganya, B., Zhang, Z., Zhu, L., Tan, Y. A., Yang, Z. & Guo, C., 2013, Proceedings - IEEE 9th International Conference on Mobile Ad-Hoc and Sensor Networks, MSN 2013. p. 336-341 6 p. 6726353. (Proceedings - IEEE 9th International Conference on Mobile Ad-Hoc and Sensor Networks, MSN 2013).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Citation (Scopus)
  • Poster: Authenticating and tracing biological anonym of VANET based on KMC decentralization and two-factor

    Wang, F., Xu, Y., Wu, L., Liu, D. & Zhu, L., 2013, MobiSys 2013 - Proceedings of the 11th Annual International Conference on Mobile Systems, Applications, and Services. p. 519-520 2 p. (MobiSys 2013 - Proceedings of the 11th Annual International Conference on Mobile Systems, Applications, and Services).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Citations (Scopus)
  • The adaptive multicast data origin authentication protocol

    Zhu, L., Yang, H. & Yang, Z., 2013, Frontiers in Internet Technologies - Second CCF Internet Conference of China, ICoC 2013, Revised Selected Papers. Springer Verlag, p. 109-121 13 p. (Communications in Computer and Information Science; vol. 401).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Citation (Scopus)
  • 2012

    A secure robust integrity reporting protocol of trusted computing for remote attestation under fully adaptive party corruptions

    Zhu, L., Zhang, Z., Liao, L. & Guo, C., 2012, Future Wireless Networks and Information Systems. VOL. 1 ed. p. 211-217 7 p. (Lecture Notes in Electrical Engineering; vol. 143 LNEE, no. VOL. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    6 Citations (Scopus)
  • Cloud storage oriented secure information gateway

    Zhang, Q., Zhu, L., Bian, H. & Peng, X., 2012, Proceedings of the 2012 International Conference on Cloud Computing and Service Computing, CSC 2012. p. 119-123 5 p. 6414487. (Proceedings of the 2012 International Conference on Cloud Computing and Service Computing, CSC 2012).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Citation (Scopus)
  • Computationally sound symbolic analysis of EAP-TNC protocol

    Zhang, Z., Zhu, L., Wang, F., Liao, L., Guo, C. & Wang, H., 2012, Trusted Systems - Third International Conference, INTRUST 2011, Revised Selected Papers. p. 113-128 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7222 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Citations (Scopus)
  • Risk-aware checkpoint selection in cloud-based scientific workflow

    Wang, M., Zhu, L. & Chen, J., 2012, Proceedings - 2nd International Conference on Cloud and Green Computing and 2nd International Conference on Social Computing and Its Applications, CGC/SCA 2012. p. 137-144 8 p. 6382809. (Proceedings - 2nd International Conference on Cloud and Green Computing and 2nd International Conference on Social Computing and Its Applications, CGC/SCA 2012).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    5 Citations (Scopus)
  • The application of data source authentication protocol to video multicast

    Zhao, S., Zhu, L., Liu, Z. & An, R., 2012, Proceedings of the 2012 National Conference on Information Technology and Computer Science, CITCS 2012. p. 495-498 4 p. (Proceedings of the 2012 National Conference on Information Technology and Computer Science, CITCS 2012).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Workflow refactoring for concurrent task execution

    Wang, M., Chen, J. & Zhu, L., 2012, Proceedings - 2nd International Conference on Cloud and Green Computing and 2nd International Conference on Social Computing and Its Applications, CGC/SCA 2012. p. 629-636 8 p. 6382881. (Proceedings - 2nd International Conference on Cloud and Green Computing and 2nd International Conference on Social Computing and Its Applications, CGC/SCA 2012).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2011

    An energy efficient and integrity-preserving aggregation protocol in wireless sensor networks

    Zhu, L. & Li, M., 2011, 30th IEEE International Performance Computing and Communications Conference, IPCCC 2011. 6108066. (Conference Proceedings of the IEEE International Performance, Computing, and Communications Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Citation (Scopus)
  • Fuzzy keyword search on encrypted cloud storage data with small index

    Liu, C., Zhu, L., Li, L. & Tan, Y., 2011, CCIS2011 - Proceedings: 2011 IEEE International Conference on Cloud Computing and Intelligence Systems. p. 269-273 5 p. 6045073. (CCIS2011 - Proceedings: 2011 IEEE International Conference on Cloud Computing and Intelligence Systems).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    81 Citations (Scopus)
  • The application of data origin authentication to video multicast communication

    Yang, H. & Zhu, L., 2011, 2011 International Conference on Multimedia Technology, ICMT 2011. p. 5129-5132 4 p. 6002165. (2011 International Conference on Multimedia Technology, ICMT 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Citation (Scopus)
  • 2010

    A compiler for group key exchange protocol to resist insider attack in universally composable framework

    Zhu, L. & Li, H., 2010, Proceedings - 3rd International Symposium on Information Science and Engineering, ISISE 2010. IEEE Computer Society, p. 559-561 3 p. 5945168. (Proceedings - 3rd International Symposium on Information Science and Engineering, ISISE 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2008

    A novel authenticated group key agreement protocol based on elliptic curve Diffie-Hellman

    Tang, H., Zhu, L. & Zhang, Z., 2008, 2008 International Conference on Wireless Communications, Networking and Mobile Computing, WiCOM 2008. 4679011. (2008 International Conference on Wireless Communications, Networking and Mobile Computing, WiCOM 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    5 Citations (Scopus)
  • A novel tree-based authenticated dynamic group key agreement protocol for wireless sensor network

    Hong, T., Liehuang, Z., Yuanda, C. & Dazhen, W., 2008, Proceedings of the International Symposium on Electronic Commerce and Security, ISECS 2008. p. 540-544 5 p. 4606124. (Proceedings of the International Symposium on Electronic Commerce and Security, ISECS 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    5 Citations (Scopus)
  • Efficient ID-based two round authenticated group key agreement protocol

    Tang, H., Zhu, L. & Zhang, Z., 2008, 2008 International Conference on Wireless Communications, Networking and Mobile Computing, WiCOM 2008. 4679085. (2008 International Conference on Wireless Communications, Networking and Mobile Computing, WiCOM 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    8 Citations (Scopus)
  • Using lifting wavelet to segment moving objects from videos

    Dai, L. L., Gu, F. F., Liu, W. C. & Zhu, L. H., 2008, Proceedings of the 2008 International Conference on Wavelet Analysis and Pattern Recognition, ICWAPR. p. 705-710 6 p. 4635870. (Proceedings of the 2008 International Conference on Wavelet Analysis and Pattern Recognition, ICWAPR; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2007

    An efficient hybrid P2P incentive scheme

    Guan, Z., Durad, M. H., Cao, Y. & Zhu, L., 2007, Proceedings - SNPD 2007: Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing. p. 377-382 6 p. 4287881. (Proceedings - SNPD 2007: Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing; vol. 3).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    6 Citations (Scopus)
  • 2006

    A novel algorithm for scrambling digital image based on cat chaotic mapping

    Zhu, L., Li, W., Liao, L. & Li, H., 2006, Proceedings - 2006 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2006. p. 601-604 4 p. 4041794. (Proceedings - 2006 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2006).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    26 Citations (Scopus)
  • A unified analysis of the evidential trust evaluation techniques

    Durad, M. H., Cao, Y., Zhu, L. & Jamli, A. S., 2006, 2006 IEEE International Conference on Industrial Informatics, INDIN'06. IEEE Computer Society, p. 960-965 6 p. 4053519. (2006 IEEE International Conference on Industrial Informatics, INDIN'06).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Multi-Media Retrieval with Semantic Web: A Case Study in Airport Security Inspection ApplicationsTPF

    Zhang, K., Liao, L. J., Cao, Y. & Zhu, L., 2006, Advances in Intelligent IT - Active Media Technology 2006. Li, Y., Looi, M. & Zhong, N. (eds.). IOS Press BV, p. 229-235 7 p. (Frontiers in Artificial Intelligence and Applications; vol. 138).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Ontological modeling of virtual organization agents

    Liao, L., Zhu, L. & Qiu, J., 2006, Agent Computing and Multi-Agent Systems: 9th Pacific Rim International Workshop on Multi-Agents, PRIMA 2006, Proceedings. Springer Verlag, p. 220-232 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4088 LNAI).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Citation (Scopus)
  • Semantic Web modeling for virtual organization: A case study in logistics

    Liao, L. & Zhu, L., 2006, The Semantic Web - ASWC 2006 - First Asian Semantic Web Conference, Proceedings. Springer Verlag, p. 602-608 7 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4185 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Citations (Scopus)
  • Two novel trust evaluation algorithms

    Durad, M. H., Cao, Y. & Liehuang, Z., 2006, 2006 International Conference on Communications, Circuits and Systems, ICCCAS, Proceedings - Computer, Optical and Broadband Communications, Computational Intelligence. p. 1641-1646 6 p. 4064214. (2006 International Conference on Communications, Circuits and Systems, ICCCAS, Proceedings; vol. 3).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    14 Citations (Scopus)