Items where Author is "Zhu, Binrui"
attribute-based encryption
Zhu, Binrui, Sun, Jiameng, Qin, Jing and Ma, Jixin (2017) Fuzzy matching: multi-authority attribute searchable encryption without central authority. Soft Computing, 23 (2). pp. 527-536. ISSN 1432-7643 (Print), 1433-7479 (Online) (doi:10.1007/s00500-017-2849-3)
cloud computing
Zhu, Binrui, Susilo, Willy ORCID: https://orcid.org/0000-0002-1562-5105, Qin, Jing, Guo, Fuchun, Zhao, Zhen and Ma, Jixin (2019) A secure and efficient data sharing and searching scheme in wireless sensor networks. Sensors, 19 (11):2583. pp. 1-23. ISSN 1424-8220 (Online) (doi:10.3390/s19112583)
Zhu, Binrui, Sun, Jiameng, Qin, Jing and Ma, Jixin (2017) Fuzzy matching: multi-authority attribute searchable encryption without central authority. Soft Computing, 23 (2). pp. 527-536. ISSN 1432-7643 (Print), 1433-7479 (Online) (doi:10.1007/s00500-017-2849-3)
confidentiality-preserving public verifiable computation (CPPVC)
Sun, Jiameng ORCID: https://orcid.org/0000-0003-3153-7698, Zhu, Binrui, Qin, Jing ORCID: https://orcid.org/0000-0003-2380-0396, Hu, Jiankun ORCID: https://orcid.org/0000-0003-0230-1432 and Ma, Jixin (2018) Confidentiality-preserving publicly verifiable computation schemes for polynomial evaluation and matrix-vector multiplication. Security and Communication Networks, 2018:5275132. ISSN 1939-0114 (Print), 1939-0122 (Online) (doi:10.1155/2018/5275132)
fuzzy identity
Zhu, Binrui, Sun, Jiameng, Qin, Jing and Ma, Jixin (2017) Fuzzy matching: multi-authority attribute searchable encryption without central authority. Soft Computing, 23 (2). pp. 527-536. ISSN 1432-7643 (Print), 1433-7479 (Online) (doi:10.1007/s00500-017-2849-3)
Internet of Things
Zhu, Binrui, Susilo, Willy ORCID: https://orcid.org/0000-0002-1562-5105, Qin, Jing, Guo, Fuchun, Zhao, Zhen and Ma, Jixin (2019) A secure and efficient data sharing and searching scheme in wireless sensor networks. Sensors, 19 (11):2583. pp. 1-23. ISSN 1424-8220 (Online) (doi:10.3390/s19112583)
matrix-vector multiplication
Sun, Jiameng ORCID: https://orcid.org/0000-0003-3153-7698, Zhu, Binrui, Qin, Jing ORCID: https://orcid.org/0000-0003-2380-0396, Hu, Jiankun ORCID: https://orcid.org/0000-0003-0230-1432 and Ma, Jixin (2018) Confidentiality-preserving publicly verifiable computation schemes for polynomial evaluation and matrix-vector multiplication. Security and Communication Networks, 2018:5275132. ISSN 1939-0114 (Print), 1939-0122 (Online) (doi:10.1155/2018/5275132)
Multi-authority
Zhu, Binrui, Sun, Jiameng, Qin, Jing and Ma, Jixin (2017) Fuzzy matching: multi-authority attribute searchable encryption without central authority. Soft Computing, 23 (2). pp. 527-536. ISSN 1432-7643 (Print), 1433-7479 (Online) (doi:10.1007/s00500-017-2849-3)
multivariate polynomial evaluation
Sun, Jiameng ORCID: https://orcid.org/0000-0003-3153-7698, Zhu, Binrui, Qin, Jing ORCID: https://orcid.org/0000-0003-2380-0396, Hu, Jiankun ORCID: https://orcid.org/0000-0003-0230-1432 and Ma, Jixin (2018) Confidentiality-preserving publicly verifiable computation schemes for polynomial evaluation and matrix-vector multiplication. Security and Communication Networks, 2018:5275132. ISSN 1939-0114 (Print), 1939-0122 (Online) (doi:10.1155/2018/5275132)
off-line keyword guessing attack
Zhu, Binrui, Susilo, Willy ORCID: https://orcid.org/0000-0002-1562-5105, Qin, Jing, Guo, Fuchun, Zhao, Zhen and Ma, Jixin (2019) A secure and efficient data sharing and searching scheme in wireless sensor networks. Sensors, 19 (11):2583. pp. 1-23. ISSN 1424-8220 (Online) (doi:10.3390/s19112583)
on-line keyword guessing attack
Zhu, Binrui, Susilo, Willy ORCID: https://orcid.org/0000-0002-1562-5105, Qin, Jing, Guo, Fuchun, Zhao, Zhen and Ma, Jixin (2019) A secure and efficient data sharing and searching scheme in wireless sensor networks. Sensors, 19 (11):2583. pp. 1-23. ISSN 1424-8220 (Online) (doi:10.3390/s19112583)
public key encryption with keyword search
Zhu, Binrui, Susilo, Willy ORCID: https://orcid.org/0000-0002-1562-5105, Qin, Jing, Guo, Fuchun, Zhao, Zhen and Ma, Jixin (2019) A secure and efficient data sharing and searching scheme in wireless sensor networks. Sensors, 19 (11):2583. pp. 1-23. ISSN 1424-8220 (Online) (doi:10.3390/s19112583)
public verifiability
Sun, Jiameng ORCID: https://orcid.org/0000-0003-3153-7698, Zhu, Binrui, Qin, Jing ORCID: https://orcid.org/0000-0003-2380-0396, Hu, Jiankun ORCID: https://orcid.org/0000-0003-0230-1432 and Ma, Jixin (2018) Confidentiality-preserving publicly verifiable computation schemes for polynomial evaluation and matrix-vector multiplication. Security and Communication Networks, 2018:5275132. ISSN 1939-0114 (Print), 1939-0122 (Online) (doi:10.1155/2018/5275132)
searchable encryption
Zhu, Binrui, Sun, Jiameng, Qin, Jing and Ma, Jixin (2017) Fuzzy matching: multi-authority attribute searchable encryption without central authority. Soft Computing, 23 (2). pp. 527-536. ISSN 1432-7643 (Print), 1433-7479 (Online) (doi:10.1007/s00500-017-2849-3)
wireless sensor networks
Zhu, Binrui, Susilo, Willy ORCID: https://orcid.org/0000-0002-1562-5105, Qin, Jing, Guo, Fuchun, Zhao, Zhen and Ma, Jixin (2019) A secure and efficient data sharing and searching scheme in wireless sensor networks. Sensors, 19 (11):2583. pp. 1-23. ISSN 1424-8220 (Online) (doi:10.3390/s19112583)