Zhuo Hao
TitleCited byYear
A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability
Z Hao, S Zhong, N Yu
Knowledge and Data Engineering, IEEE Transactions on, 1-1, 2010
2462010
A multiple-replica remote data possession checking protocol with public verifiability
Z Hao, N Yu
Data, Privacy and E-Commerce (ISDPE), 2010 Second International Symposium on …, 2010
812010
俞能海, 郝卓, 徐甲甲, 张卫明, 张驰
N YU, Z HAO, J XU, W ZHANG, C ZHANG
电子学报 41 (2), 371-381, 2013
69*2013
Review of cloud computing security
NH Yu, Z Hao, JJ Xu, WM Zhang, C Zhang
Dianzi Xuebao(Acta Electronica Sinica) 41 (2), 371-381, 2013
562013
A Time-Bound Ticket-Based Mutual Authentication Scheme for Cloud Computing
Z Hao, S Zhong, N Yu
44*2006
A Security Enhanced Remote Password Authentication Scheme using Smart Card
Z Hao, N Yu
Data, Privacy and E-Commerce (ISDPE), 2010 Second International Symposium on …, 2010
252010
IMAGE FORENSICS WITH ROTATION-TOLERANT RESAMPLING DETECTION
R Qian, W Li, N Yu, Z Hao
14
A Novel Parallel Traffic Control Mechanism for Cloud Computing
Z Li, N Yu, Z Hao
Cloud Computing Technology and Science (CloudCom), 2010 IEEE Second …, 2010
62010
A Multi-Hop Key Agreement Scheme for Wireless Ad Hoc Networks based on Channel Characteristics
Z Hao, S Zhong, N Yu
6*
Rights Sharing Scheme for Online DRM System Using Digital Ticket
Y Liu, N Yu, Z Hao
Management and Service Science, 2009. MASS'09. International Conference on, 1-6, 2009
52009
Towards wireless security without computational assumptions
Z Hao, S Zhong, LE Li
Buffalo, 2006
5*2006
Towards wireless security without computational assumptions—An oblivious transfer protocol based on an unauthenticated wireless channel
Z Hao, S Zhong, LE Li
INFOCOM, 2011 Proceedings IEEE, 2156-2164, 2011
42011
RandTest: Towards more secure and reliable dataflow processing in cloud computing
Y Liang, Z Hao, N Yu, B Liu
Cloud and Service Computing (CSC), 2011 International Conference on, 180-184, 2011
32011
A password-authenticated key agreement scheme with perfect forward secrecy
Z HAO, N YU
Journal of University of Science and Technology of China, 2011
22011
Bilinear Map Key Management Scheme with Dishonest Behavior Discovery
H WANG, N YU, Z HAO
Journal of Chinese Computer Systems 10, 029, 2010
2010
Key management scheme DPSKC for Ad hoc space network
S WANG, N YU, Z HAO
Journal of PLA University of Science and Technology (Natural Science Edition …, 2009
2009
A novel key management scheme based on elliptic curves over the ring Zn 2 for ad hoc space network
N Yu, Z Hao
2007
The system can't perform the operation now. Try again later.
Articles 1–17