


default search action
Bo Zhu 0001
Person information
- affiliation: Concordia University, Institute for Information Systems Engineering, Montreal, QC, Canada
- affiliation: George Mason University, Center for Secure Information Systems, Fairfax, VA, USA
- affiliation (PhD 2006): National University of Singapore, School of Computing, Singapore
- affiliation: Institute for Infocomm Research, Singapore
Other persons with the same name
- Bo Zhu — disambiguation page
- Bo Zhu 0002
— Georgia Institute of Technology, School of Interactive Computing, AT, USA (and 3 more)
- Bo Zhu 0003 — Hubei Provincial Environmental Monitoring Center Station, Wuhan, China (and 1 more)
- Bo Zhu 0004 — Harvard University, Department of Physics, Cambridge, MA, USA (and 1 more)
- Bo Zhu 0005
— Sun Yat-sen University (SYSU), School of Aeronautics and Astronautics, Guangzhou, China (and 2 more)
- Bo Zhu 0006
— BMW Brilliance Automotive Ltd., Shenyang, China
- Bo Zhu 0007 — University of Waterloo, Department of Electrical and Computer Engineering, ON, Canada
- Bo Zhu 0008 — Beijing Institute of Technology, Beijing, China (and 1 more)
- Bo Zhu 0009
— Nanjing University of Posts and Telecommunications, College of Automation, School of Automation and Artificial Intelligence, China
- Bo Zhu 0010 — Technical University of Madrid, School of Computer Science, Spain
- Bo Zhu 0011
— Meta Reality Labs, Menlo Park, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2011
- [c17]Benwen Zhu, Bo Zhu, Kui Ren
:
PEKSrand: Providing Predicate Privacy in Public-Key Encryption with Keyword Search. ICC 2011: 1-6 - 2010
- [j7]Bo Zhu, Kui Ren
, Lingyu Wang, Mourad Debbabi
:
PCM: a privacy-preserving detection mechanism in mobile ad hoc networks. Secur. Commun. Networks 3(2-3): 167-184 (2010) - [j6]Bo Zhu, Sanjeev Setia, Sushil Jajodia
, Lingyu Wang:
Providing witness anonymity under peer-to-peer settings. IEEE Trans. Inf. Forensics Secur. 5(2): 324-336 (2010) - [j5]Bo Zhu, Sanjeev Setia, Sushil Jajodia
, Sankardas Roy, Lingyu Wang:
Localized Multicast: Efficient and Distributed Replica Detection in Large-Scale Sensor Networks. IEEE Trans. Mob. Comput. 9(7): 913-926 (2010) - [j4]Zhiguo Wan, Kui Ren
, Bo Zhu, Bart Preneel
, Ming Gu:
Anonymous User Communication for Privacy Protection in Wireless Metropolitan Mesh Networks. IEEE Trans. Veh. Technol. 59(2): 519-532 (2010) - [i3]Benwen Zhu, Bo Zhu, Kui Ren:
PEKSrand: Providing Predicate Privacy in Public-key Encryption with Keyword Search. IACR Cryptol. ePrint Arch. 2010: 466 (2010)
2000 – 2009
- 2009
- [j3]Kui Ren
, Wenjing Lou, Bo Zhu, Sushil Jajodia:
Secure and Efficient Multicast in Wireless Sensor Networks Allowing Ad hoc Group Formation. IEEE Trans. Veh. Technol. 58(4): 2018-2029 (2009) - [c16]Zhiguo Wan, Kui Ren
, Bo Zhu, Bart Preneel
, Ming Gu:
Anonymous user communication for privacy protection in wireless metropolitan mesh networks. AsiaCCS 2009: 368-371 - [c15]Jin Li, Kui Ren
, Bo Zhu, Zhiguo Wan:
Privacy-Aware Attribute-Based Encryption with User Accountability. ISC 2009: 347-362 - [c14]Hongying Tang, Bo Zhu, Kui Ren
:
A New Approach to Malware Detection. ISA 2009: 229-238 - [i2]Jin Li, Kui Ren, Bo Zhu, Zhiguo Wan:
Privacy-aware Attribute-based Encryption with User Accountability. IACR Cryptol. ePrint Arch. 2009: 284 (2009) - 2008
- [c13]Bo Zhu, Kui Ren
, Lingyu Wang:
Anonymous Misbehavior Detection in Mobile Ad Hoc Networks. ICDCS Workshops 2008: 358-363 - [c12]Wei Li, Lingyu Wang, Bo Zhu, Lei Zhang:
An Integrity Lock Architecture for Supporting Distributed Authorizations in Database Federations. SEC 2008: 189-203 - [c11]Qian Wang
, Kui Ren, Yanchao Zhang, Bo Zhu:
Opportunistic Cooperation with Receiver-Based Ratio Combining Strategy. WASA 2008: 361-372 - 2007
- [c10]Xuxin Xu, Lingyu Wang, Amr M. Youssef, Bo Zhu:
Preventing Collusion Attacks on the One-Way Function Tree (OFT) Scheme. ACNS 2007: 177-193 - [c9]Bo Zhu, Venkata Gopala Krishna Addada, Sanjeev Setia, Sushil Jajodia, Sankardas Roy:
Efficient Distributed Detection of Node Replication Attacks in Sensor Networks. ACSAC 2007: 257-267 - 2006
- [j2]Bo Zhu, Sushil Jajodia, Mohan S. Kankanhalli
:
Building trust in peer-to-peer systems: a review. Int. J. Secur. Networks 1(1/2): 103-112 (2006) - [c8]Bo Zhu, Sanjeev Setia, Sushil Jajodia:
Providing witness anonymity in peer-to-peer systems. CCS 2006: 6-16 - [c7]Bo Zhu, Sushil Jajodia, Mohan S. Kankanhalli, Feng Bao, Robert H. Deng
:
An Anonymous Routing Protocol with The Local-repair Mechanism for Mobile Ad Hoc Networks. SECON 2006: 70-79 - [c6]Zhiguo Wan, Bo Zhu, Robert H. Deng
, Feng Bao, Akkihebbal L. Ananda:
Efficient key tree construction for group key agreement in ad hoc networks. WCNC 2006: 652-658 - 2005
- [j1]Bo Zhu, Feng Bao, Robert H. Deng
, Mohan S. Kankanhalli
, Guilin Wang:
Efficient and robust key management for large mobile ad hoc networks. Comput. Networks 48(4): 657-682 (2005) - [c5]Bo Zhu, Guilin Wang, Zhiguo Wan, Mohan S. Kankanhalli, Feng Bao, Robert H. Deng
:
Providing efficient certification services against active attacks in ad hoc networks. IPCCC 2005: 285-292 - [c4]Zhiguo Wan, Bo Zhu, Robert H. Deng
, Feng Bao, Akkihebbal L. Ananda:
DoS-resistant access control protocol with identity confidentiality for wireless networks. WCNC 2005: 1521-1526 - 2004
- [c3]Bo Zhu, Tieyan Li, Huafei Zhu, Mohan S. Kankanhalli
, Feng Bao, Robert H. Deng
:
Trust Establishment in Large Scale Grid Settings. GCC 2004: 317-324 - [c2]Bo Zhu, Zhiguo Wan, Mohan S. Kankanhalli, Feng Bao, Robert H. Deng
:
Anonymous Secure Routing in Mobile Ad-Hoc Networks. LCN 2004: 102-108 - 2003
- [c1]Guilin Wang, Xiaoxi Han, Bo Zhu:
On the Security of Two Threshold Signature Schemes with Traceable Signers. ACNS 2003: 111-122 - [i1]Guilin Wang, Bo Zhu:
Remarks on Saeednia's Identity-based Society Oriented Signature Scheme with Anonymous Signers. IACR Cryptol. ePrint Arch. 2003: 46 (2003)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-04-29 22:17 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint