default search action
Hanshu Hong
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j21]Hanshu Hong, Yibo Sun, Zhixin Sun:
A designated private set based trapdoor authentication scheme for privacy preserving trust management in decentralized systems. Discov. Comput. 27(1): 31 (2024) - 2023
- [j20]Hanshu Hong, Zhixin Sun:
Constructing conditional PKEET with verification mechanism for data privacy protection in intelligent systems. J. Supercomput. 79(13): 15004-15022 (2023) - 2022
- [j19]Hanshu Hong, Zhixin Sun:
TS-ABOS-CMS: time-bounded secure attribute-based online/offline signature with constant message size for IoT systems. J. Syst. Archit. 123: 102388 (2022) - 2021
- [j18]Jing Gong, Yurong Mei, Feng Xiang, Hanshu Hong, Yibo Sun, Zhixin Sun:
A data privacy protection scheme for Internet of things based on blockchain. Trans. Emerg. Telecommun. Technol. 32(5) (2021) - [j17]Hanshu Hong, Zhixin Sun:
A flexible attribute based data access management scheme for sensor-cloud system. J. Syst. Archit. 119: 102234 (2021) - [j16]Hanshu Hong, Ximeng Liu, Zhixin Sun:
A Fine-Grained Attribute Based Data Retrieval with Proxy Re-Encryption Scheme for Data Outsourcing Systems. Mob. Networks Appl. 26(6): 2509-2514 (2021) - [j15]Hanshu Hong, Zhixin Sun:
A secure peer to peer multiparty transaction scheme based on blockchain. Peer-to-Peer Netw. Appl. 14(3): 1106-1117 (2021) - [c2]Hanshu Hong, Qin Wu, Feng Dong, Wei Song, Ronghua Sun, Tao Han, Cheng Zhou, Hongwei Yang:
NetGraph: An Intelligent Operated Digital Twin Platform for Data Center Networks. NAI@SIGCOMM 2021: 26-32 - 2020
- [j14]Bing Hu, Zhixin Sun, Hanshu Hong, Jian Liu:
UAV-aided networks with optimization allocation via artificial bee colony with intellective search. EURASIP J. Wirel. Commun. Netw. 2020(1): 40 (2020)
2010 – 2019
- 2019
- [j13]Hanshu Hong, Bing Hu, Zhixin Sun:
Toward secure and accountable data transmission in Narrow Band Internet of Things based on blockchain. Int. J. Distributed Sens. Networks 15(4) (2019) - [c1]Hanshu Hong, Xiaokang Zhou, Bing Hu, Zhixin Sun:
A Ciphertext Policy Attribute Based Signcryption Scheme with Secure and Flexible Key Evolving. ISPA/BDCloud/SocialCom/SustainCom 2019: 413-418 - 2018
- [j12]Jingjing Xu, Hanshu Hong, Guofeng Lin, Zhixin Sun:
A New Inter-Domain Information Sharing Smart System Based on ABSES in SDN. IEEE Access 6: 12790-12799 (2018) - [j11]Guofeng Lin, Lirong You, Bing Hu, Hanshu Hong, Zhixin Sun:
A Coordinated Ciphertext Policy Attribute-based PHR Access Control with User Accountability. KSII Trans. Internet Inf. Syst. 12(4): 1832-1853 (2018) - [j10]Hanshu Hong, Zhixin Sun:
Achieving secure data access control and efficient key updating in mobile multimedia sensor networks. Multim. Tools Appl. 77(4): 4477-4490 (2018) - [j9]Hanshu Hong, Zhixin Sun:
Sharing your privileges securely: a key-insulated attribute based proxy re-encryption scheme for IoT. World Wide Web 21(3): 595-607 (2018) - 2017
- [j8]Guofeng Lin, Hanshu Hong, Zhixin Sun:
A Collaborative Key Management Protocol in Ciphertext Policy Attribute-Based Encryption for Cloud Data Sharing. IEEE Access 5: 9464-9475 (2017) - [j7]Hanshu Hong, Zhixin Sun:
Efficient key insulated attribute based signature without bilinear pairings for mobile communications. Autom. Control. Comput. Sci. 51(3): 159-166 (2017) - [j6]Hanshu Hong, Yunhao Xia, Zhixin Sun, Ximeng Liu:
Provably secure attribute based signcryption with delegated computation and efficient key updating. KSII Trans. Internet Inf. Syst. 11(5): 2646-2659 (2017) - [j5]Yunhao Xia, Hanshu Hong, Guofeng Lin, Zhixin Sun:
A Secure and Efficient Cloud Resource Allocation Scheme with Trust Evaluation Mechanism Based on Combinatorial Double Auction. KSII Trans. Internet Inf. Syst. 11(9): 4197-4219 (2017) - [j4]Hanshu Hong, Yunhao Xia, Zhixin Sun:
Towards Secure Data Retrieval for Multi-Tenant Architecture Using Attribute-Based Key Word Search. Symmetry 9(6): 89 (2017) - [j3]Hanshu Hong, Zhixin Sun:
A Key-Insulated Ciphertext Policy Attribute Based Signcryption for Mobile Networks. Wirel. Pers. Commun. 95(2): 1215-1228 (2017) - 2016
- [j2]Hanshu Hong, Zhixin Sun, Ximeng Liu:
A key-insulated CP-ABE with key exposure accountability for secure data sharing in the cloud. KSII Trans. Internet Inf. Syst. 10(5): 2394-2406 (2016) - [j1]Hanshu Hong, Zhixin Sun:
An efficient and traceable KP-ABS scheme with untrusted attribute authority in cloud computing. J. Cloud Comput. 5: 2 (2016)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-01 20:46 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint