


Остановите войну!
for scientists:


default search action
Jianhong Zhang
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [j66]Jianhong Zhang
, Haowei Yang
:
A Privacy-Preserving Remote Heart Rate Abnormality Monitoring System. IEEE Access 11: 97089-97098 (2023) - [j65]Yu Zhou, Shuo Gao, Mingwei Sun
, Yajing Zhou, Zengqiang Chen, Jianhong Zhang:
Recognizing Chaos by Deep Learning and Transfer Learning on Recurrence Plots. Int. J. Bifurc. Chaos 33(10): 2350116:1-2350116:13 (2023) - [j64]Jianhong Zhang, Chenghe Dong:
Privacy-preserving data aggregation scheme against deletion and tampering attacks from aggregators. J. King Saud Univ. Comput. Inf. Sci. 35(4): 100-111 (2023) - [j63]Jianhong Zhang
, Qijia Zhang
:
Comment on "Secure and Lightweight Conditional Privacy-Preserving Authentication for Securing Traffic Emergency Messages in VANETs". IEEE Trans. Inf. Forensics Secur. 18: 1037-1038 (2023) - [j62]Jianhong Zhang
, Chenghe Dong:
Secure and Lightweight Data Aggregation Scheme for Anonymous Multi-Receivers in WBAN. IEEE Trans. Netw. Sci. Eng. 10(1): 81-91 (2023) - [c76]Jianhong Zhang, Jie Ma, Jinxiao Yuan, Shaohua Wang:
Multi-mode signal fusion and improved residual dense network fault diagnosis of nuclear power plant. SAFEPROCESS 2023: 1-6 - 2022
- [j61]Jianhong Zhang
, Min Wang, Keming Yang, Bing Wu, Yaxing Li, Yanru Li
, Qianqian Han:
Predicting Copper and Lead Concentration in Crops Using Reflectance Spectroscopy Associated With Intrinsic Wavelength-Scale Decomposition Spectral Transformation. IEEE Access 10: 52258-52272 (2022) - [j60]Wenle Bai
, Zhongjun Yang
, Jianhong Zhang
:
Corrigendum to "Randomization-Based Dynamic Programming Offloading Algorithm for Mobile Fog Computing". Secur. Commun. Networks 2022: 9879521:1-9879521:1 (2022) - [j59]Jianhong Zhang, Haoting Han:
A Lightweight and Privacy-Friendly Data Aggregation Scheme against Abnormal Data. Sensors 22(4): 1452 (2022) - [c75]Jianhong Zhang, Chenghe Dong, Ziang Li, Sentian Yin, Lidong Han:
On the Security of Verifiable Privacy-preserving Multi-type Data Aggregation Scheme in Smart Grid. CyberC 2022: 9-11 - 2021
- [j58]Jianhong Zhang
, Menglong Wu
:
Efficient Cloud-Based Private Set Intersection Protocol with Hidden Access Attribute and Integrity Verification. Secur. Commun. Networks 2021: 3963037:1-3963037:13 (2021) - [j57]Wenle Bai, Zhongjun Yang
, Jianhong Zhang, Rajiv Kumar:
Randomization-Based Dynamic Programming Offloading Algorithm for Mobile Fog Computing. Secur. Commun. Networks 2021: 4348511:1-4348511:9 (2021) - [c74]Xi Cui, Mengjie Liu, Na Zhang, Jianhong Zhang, Na Wei, Ke Li:
Brain functional networks analysis of five fingers grasping in virtual reality environment. EMBC 2021: 804-807 - [c73]Manli Zhang, Jianhong Zhang, Zhiwu Lu, Tao Xiang, Mingyu Ding, Songfang Huang:
IEPT: Instance-Level and Episode-Level Pretext Tasks for Few-Shot Learning. ICLR 2021 - [c72]Jianhong Zhang, Menglong Wu, Qijia Zhang, Chenggen Peng:
A lightweight Data Sharing Scheme with Resisting Key Abuse in Mobile Edge Computing. INFOCOM Workshops 2021: 1-6 - [c71]Jianhong Zhang, Manli Zhang, Zhiwu Lu, Tao Xiang:
AdarGCN: Adaptive Aggregation GCN for Few-Shot Learning. WACV 2021: 3481-3490 - 2020
- [j56]Hongmei Luo
, Jun Qian
, Zhichao Xu
, Wanjing Liu
, Lei Xu
, Ying Li
, Jiang Xu
, Jianhong Zhang
, Xiaolan Xu
, Chang Liu
, Liu He
, Jianqin Li
, Chao Sun
, Francis Martin
, Jingyuan Song
, Shilin Chen
:
The Wolfiporia cocos Genome and Transcriptome Shed Light on the Formation of Its Edible and Medicinal Sclerotium. Genom. Proteom. Bioinform. 18(4): 455-467 (2020) - [j55]Jianhong Zhang, Wenle Bai, Zhengtao Jiang:
On the Security of a Practical Constant-Size Ring Signature Scheme. Int. J. Netw. Secur. 22(3): 392-396 (2020) - [j54]Jianhong Zhang
, Qijia Zhang, Shenglong Ji:
A Fog-Assisted Privacy-Preserving Task Allocation in Crowdsourcing. IEEE Internet Things J. 7(9): 8331-8342 (2020) - [j53]Jianhong Zhang, Wenle Bai, Xianmin Wang
:
Identity-based data storage scheme with anonymous key generation in fog computing. Soft Comput. 24(8): 5561-5571 (2020) - [c70]Jianhong Zhang, Ke Li, Leitong Lin, Boqiang Liu, Na Wei:
Hand-oriented tasking assessment of fine movement control deficits in Alzheimer's Disease. CISP-BMEI 2020: 862-866 - [i4]Jianhong Zhang, Manli Zhang, Zhiwu Lu, Tao Xiang, Ji-Rong Wen:
AdarGCN: Adaptive Aggregation GCN for Few-Shot Learning. CoRR abs/2002.12641 (2020)
2010 – 2019
- 2019
- [j52]Jianhong Zhang
, Wenle Bai, Yuehai Wang:
Non-Interactive ID-Based Proxy Re-Signature Scheme for IoT Based on Mobile Edge Computing. IEEE Access 7: 37865-37875 (2019) - [j51]Jianhong Zhang
, Zhengtao Jiang:
Identity-and-data privacy forward security public auditing protocol in the standard model. Int. J. Commun. Syst. 32(15) (2019) - [j50]Jianhong Zhang, Hongxin Meng:
Genuine and secure public auditing for the outsourced data in cloud. Int. J. High Perform. Comput. Netw. 14(2): 183-196 (2019) - [j49]Li Liu
, Jianhong Zhang, Xiaodong Fu, Lijun Liu, Qingsong Huang:
Unsupervised segmentation and elm for fabric defect image classification. Multim. Tools Appl. 78(9): 12421-12449 (2019) - [j48]Jianhong Zhang, Peirong Ou:
Privacy-Preserving Multi-Receiver Certificateless Broadcast Encryption Scheme with De-Duplication. Sensors 19(15): 3370 (2019) - [j47]Jianhong Zhang:
Improvement of ID-based proxy re-signature scheme with pairing-free. Wirel. Networks 25(7): 4319-4329 (2019) - [c69]Jianhong Zhang, Ke Li, Leitong Lin, Boqiang Liu, Na Wei:
Effects of Alzheimer's Disease on Reach-to-Pinch Performance with Multimodal Sensory Feedbacks. CISP-BMEI 2019: 1-5 - [c68]Le Lv, Jianbo Cheng, Nanbo Peng, Min Fan, Dongbin Zhao, Jianhong Zhang:
Auto-encoder based Graph Convolutional Networks for Online Financial Anti-fraud. CIFEr 2019: 1-6 - [c67]Yulei Niu, Hanwang Zhang
, Manli Zhang, Jianhong Zhang, Zhiwu Lu
, Ji-Rong Wen:
Recursive Visual Attention in Visual Dialog. CVPR 2019: 6679-6688 - [c66]Guangzhen Liu, Jiechao Guan, Manli Zhang, Jianhong Zhang, Zihao Wang, Zhiwu Lu
:
Joint Projection and Subspace Learning for Zero-Shot Recognition. ICME 2019: 1228-1233 - [c65]Yuqi Huo, Jiechao Guan, Jianhong Zhang, Manli Zhang, Ji-Rong Wen, Zhiwu Lu
:
Zero-Shot Learning with Few Seen Class Samples. ICME 2019: 1336-1341 - 2018
- [j46]Jianhong Zhang
, Jian Mao:
On the Security of a Pairing-Free Certificateless Signcryption Scheme. Comput. J. 61(4): 469-471 (2018) - [j45]Jianhong Zhang, Xubing Zhao, Weina Zhen:
S2PAD: secure self-certified public auditing for data integrity in cloud storage and its extension. Int. J. Inf. Commun. Technol. 12(1/2): 113-130 (2018) - [c64]Qianjia Huang, Diana Inkpen, Jianhong Zhang, David Van Bruwaene:
Cyberbullying Intervention Based on Convolutional Neural Networks. TRAC@COLING 2018 2018: 42-51 - [c63]Jianhong Zhang, Peirong Ou, Wenle Bai:
On the Security of a Data Integrity Auditing Scheme in Mobile Multi-cloud Environment. ICCSP 2018: 40-44 - [i3]Yulei Niu, Hanwang Zhang, Manli Zhang, Jianhong Zhang, Zhiwu Lu, Ji-Rong Wen:
Recursive Visual Attention in Visual Dialog. CoRR abs/1812.02664 (2018) - 2017
- [j44]Xiao-dong Feng, Li-wei Li, Jianhong Zhang, Yun-ping Zhu, Cheng Chang
, Kun-xian Shu, Jie Ma
:
Using the entrapment sequence method as a standard to evaluate key steps of proteomics data analysis process. BMC Genom. 18(S2) (2017) - [j43]Jianhong Zhang, Hongxin Meng, Yong Yu:
Achieving public verifiability and data dynamics for cloud data in the standard model. Clust. Comput. 20(3): 2641-2653 (2017) - [j42]Jianhong Zhang, Jian Mao:
Anonymous multi-receiver broadcast encryption scheme with strong security. Int. J. Embed. Syst. 9(2): 177-187 (2017) - [j41]Jianhong Zhang, Xubing Zhao, Weina Zhen:
OGPADSM2: oriented-group public auditing for data sharing with multi-user modification. Int. J. High Perform. Comput. Netw. 10(3): 240-249 (2017) - [j40]Jianhong Zhang, Pengyan Li, Min Xu:
On the Security of an Mutual Verifiable Provable Data Auditing in Public Cloud Storage. Int. J. Netw. Secur. 19(4): 605-612 (2017) - [j39]Debiao He
, Huaqun Wang
, Jianhong Zhang, Lina Wang:
Insecurity of an identity-based public auditing protocol for the outsourced data in cloud storage. Inf. Sci. 375: 48-53 (2017) - [j38]Jian Mao, Wenqian Tian
, Yan Zhang, Jian Cui, Hanjun Ma
, Jingdong Bian, Jianwei Liu, Jianhong Zhang
:
Co-Check: Collaborative Outsourced Data Auditing in Multicloud Environment. Secur. Commun. Networks 2017: 2948025:1-2948025:13 (2017) - [c62]Jianhong Zhang, Hao Xiao:
Public Auditing Scheme of Dynamic Data Sharing Suiting for Cloud-Based EHR System. CyberC 2017: 235-243 - 2016
- [j37]Jianhong Zhang, Xubing Zhao:
Efficient chameleon hashing-based privacy-preserving auditing in cloud storage. Clust. Comput. 19(1): 47-56 (2016) - [j36]Jianhong Zhang, Pengyan Li, Jian Mao:
IPad: ID-based public auditing for the outsourced data in the standard model. Clust. Comput. 19(1): 127-138 (2016) - [j35]Jianhong Zhang, Jian Mao:
Efficient public key encryption with revocable keyword search in cloud computing. Clust. Comput. 19(3): 1211-1217 (2016) - [j34]Jianhong Zhang, Qiaocui Dong:
Efficient ID-based public auditing for the outsourced data in cloud storage. Inf. Sci. 343-344: 1-14 (2016) - [j33]Jianhong Zhang, Jian Mao:
Efficient Multi-Proxy Signature Scheme with Short Length in the Standard Model. J. Inf. Sci. Eng. 32(4): 1097-1112 (2016) - [j32]Jianhong Zhang, Xubing Zhao, Jian Mao:
Attack on Chen et al.'s certificateless aggregate signature scheme. Secur. Commun. Networks 9(1): 54-59 (2016) - [c61]Jianhong Zhang, Shuai Liu, Jian Mao:
On the security of a dynamic-hash-table based public auditing protocol. CISP-BMEI 2016: 1954-1958 - [c60]Jianhong Zhang, Pengyan Li, Zhibin Sun, Jian Mao:
ID-based Data Integrity Auditing Scheme from RSA with Resisting Key Exposure. ProvSec 2016: 83-100 - [c59]Jianhong Zhang, Zhibin Sun, Shuai Liu, Pengyan Liu:
On the Security of a Threshold Anonymous Authentication Protocol for VANETs. SpaCCS 2016: 145-155 - [c58]Jian Mao, Jian Cui, Yan Zhang, Hanjun Ma, Jianhong Zhang:
Collaborative Outsourced Data Integrity Checking in Multi-Cloud Environment. WASA 2016: 511-523 - 2015
- [j31]Jianhong Zhang, Jian Mao:
An improved anonymous multi-receiver identity-based encryption scheme. Int. J. Commun. Syst. 28(4): 645-658 (2015) - [j30]Jianhong Zhang, Xubing Zhao, Cheng Ji:
A novel authenticated encryption scheme and its extension. Inf. Sci. 317: 196-201 (2015) - [j29]Jianhong Zhang, Xubing Zhao:
Privacy-Preserving Public Auditing Scheme for Shared Data with Supporting Multi-function. J. Commun. 10(7): 535-542 (2015) - [j28]Jianhong Zhang, Wenjing Tang:
On the security of Kim et al. two ID-based broadcast signcryption schemes. Secur. Commun. Networks 8(8): 1509-1514 (2015) - [c57]Jianhong Zhang, Xubing Zhao:
An efficient revocable certificateless signature scheme. FSKD 2015: 1852-1857 - [c56]Jianhong Zhang, Pengyan Li, Jian Mao:
An Oriented-Group Supporting Multi-user Public Auditing for Data Sharing. SmartCity 2015: 996-1002 - 2014
- [j27]Jianhong Zhang, Wenjing Tang, Jian Mao:
Efficient public verification proof of retrievability scheme in cloud. Clust. Comput. 17(4): 1401-1411 (2014) - [j26]Jianhong Zhang, Yong Yu:
Short computational Diffie-Hellman-based proxy signature scheme in the standard model. Int. J. Commun. Syst. 27(10): 1894-1907 (2014) - [j25]Jianhong Zhang, Yuwei Xu:
Privacy-preserving authentication protocols with efficient verification in VANETs. Int. J. Commun. Syst. 27(12): 3676-3692 (2014) - [j24]Jianhong Zhang, Min Xu, Liying Liu:
On the Security of a Secure Batch Verification with Group Testing for VANET. Int. J. Netw. Secur. 16(5): 355-362 (2014) - [c55]Jianhong Zhang, Weina Zeng:
Self-Certified Public Auditing for Data Integrity in Cloud Storage. 3PGCIC 2014: 267-273 - [c54]Jianhong Zhang, Weina Zhen:
Practical Preserving Identity-Privacy Anonymous Data Sharing in Cloud Computing. CSE 2014: 1629-1636 - [c53]Huan Du, Guoliang Fan, Jianqiang Yi, Jianhong Zhang, Jie Zhang:
Disturbance compensated adaptive backstepping control for an unmanned seaplane. ROBIO 2014: 1725-1730 - 2013
- [j23]Jianhong Zhang, Liying Liu, Yuanbo Cui, Zhipeng Chen:
SP2DAS: Self-certified PKC-Based Privacy-Preserving Data Aggregation Scheme in Smart Grid. Int. J. Distributed Sens. Networks 9 (2013) - [j22]Jianhong Zhang, Jian Mao, Yuwei Xu:
On the security of an ID-based anonymous proxy signature scheme and its improved scheme. Int. J. Embed. Syst. 5(3): 181-188 (2013) - [j21]Jianhong Zhang, Yuwei Xu, Jiancheng Zou:
Comment on Wang et al.'s anonymous multi-receiver ID-based encryption scheme and its improved schemes. Int. J. Intell. Inf. Database Syst. 7(5): 400-413 (2013) - [j20]Jianhong Zhang, Yuwei Xu, Zhipeng Chen:
Augmented Broadcaster Identity-based Broadcast Encryption. J. Digit. Inf. Manag. 11(3): 227-234 (2013) - [j19]Jianhong Zhang, Zhibin Sun:
An ID-Based Server-Aided Verification Short Signature Scheme Avoid Key Escrow. J. Inf. Sci. Eng. 29(3): 459-473 (2013) - [c52]Jianhong Zhang, Weina Zhen, Min Xu:
An Efficient Privacy-Preserving Authentication Protocol in VANETs. MSN 2013: 272-277 - 2012
- [j18]Jianhong Zhang, Jane Mao:
An efficient RSA-based certificateless signature scheme. J. Syst. Softw. 85(3): 638-642 (2012) - [c51]Jianhong Zhang, Yuwei Xu:
Breaking and Repairing of an Anonymous and Traceable Communication Protocol for Vehicular Ad Hoc Networks. CIT 2012: 88-93 - [c50]Jianhong Zhang, Yuwei Xu:
On the Security of an Enhanced ID-Based Anonymous Proxy Signature Scheme in ICCAE2010. INCoS 2012: 245-250 - [c49]Jianhong Zhang, Yuwei Xu:
Comment on Anonymous Multi-receiver Identity-Based Encryption Scheme. INCoS 2012: 473-476 - 2011
- [j17]Jianhong Zhang, Jian Mao:
Another Efficient Proxy Signature Scheme in the Standard Model. J. Inf. Sci. Eng. 27(4): 1249-1264 (2011) - [c48]Jianhong Zhang, Jianqiang Yi, Xiangmin Tan, Yi Yu:
Fuzzy control of a four-rope-driven level-adjustment robot considering all constrained situations. ACC 2011: 557-562 - [c47]Jianhong Zhang, Yuanbo Cui, Xi Wu:
Forgeability Attack of Two Special Signature Schemes. ICIC (1) 2011: 494-501 - [c46]Jianhong Zhang, Fenhong Guo, Zhibin Sun, Jilin Wang:
Forgeability Attack of Two DLP-Base Proxy Blind Signature Schemes. ICSI (2) 2011: 395-402 - 2010
- [j16]Jianhong Zhang, Hua Chen, Shengnan Gao:
Efficient Blind Signature Scheme based on Modified Generalized Bilinear Inversion for Multiple Signers. J. Digit. Content Technol. its Appl. 4(2): 142-148 (2010) - [j15]Jianhong Zhang, Min Xu, Xue Liu, Xiuna Su:
On the Security of Convertible Multiauthenticated Encryption Scheme and Its Improved Scheme. J. Digit. Content Technol. its Appl. 4(7): 190-196 (2010) - [j14]Jianhong Zhang, Chenglian Liu
, Yixian Yang:
An efficient secure proxy verifiably encrypted signature scheme. J. Netw. Comput. Appl. 33(1): 29-34 (2010) - [c45]Jianhong Zhang, Xiuna Su:
An Efficient Signcryption Schemes Based from Bilinear Maps in the Standard Model. APSCC 2010: 447-453 - [c44]Jianhong Zhang, Xue Liu:
An Efficient Strong ID-Based Signature Scheme with Unforgeability. FCST 2010: 239-245 - [c43]Chenglian Liu
, Jianhong Zhang, Shaoyi Deng:
Security Analysis of Liu-Li Digital Signature Scheme. FGIT-FGCN (2) 2010: 63-70 - [c42]Jianhong Zhang, Shengnan Gao:
Efficient Strong Fair Concurrent Signature Scheme. ICEE 2010: 1327-1330 - [c41]Jianhong Zhang, Jilin Wang:
A Controllable Anonymous Proxy Signature Scheme with Revocation. ICIC (2) 2010: 590-598 - [c40]Jianhong Zhang, Shengnan Gao:
Efficient provable certificateless blind signature scheme. ICNSC 2010: 292-297 - [c39]Jianhong Zhang, Hua Chen, Xue Liu, Chenglian Liu
:
An Efficient Blind Ring Signature Scheme without Pairings. WAIM Workshops 2010: 177-188
2000 – 2009
- 2009
- [j13]Jianhong Zhang, Jian Mao:
A novel identity-based multi-signcryption scheme. Comput. Commun. 32(1): 14-18 (2009) - [j12]Jianhong Zhang, Yixian Yang, Xinxin Niu:
A Novel Identity-Based Multi-Signcryption Scheme. Int. J. Distributed Sens. Networks 5(1): 28 (2009) - [j11]Jianhong Zhang, Cheng Ji, Qin Geng:
Designated-Verifier Chameleon Proxy Signature. Int. J. Distributed Sens. Networks 5(1): 29 (2009) - [c38]Jianhong Zhang, Qin Geng:
Cryptoanalysis of Two Signcryption Schemes. IAS 2009: 65-68 - [c37]Yi Yu, Jianqiang Yi, Chengdong Li, Dongbin Zhao, Jianhong Zhang:
Control of a rope-driven self-leveling device for leveling adjustment. ACC 2009: 5115-5120 - [c36]Jianhong Zhang, Hua Chen, Qin Geng:
Efficient and Provably Secure Self-certified Signature Scheme. AMT 2009: 501-512 - [c35]Jianhong Zhang, Hua Chen, Shengnan Gao, Yixian Yang:
A Special Proxy Signature Scheme with Multi-warrant. ASIAN 2009: 147-157 - [c34]Jianhong Zhang, Hua Chen, Shengnan Gao:
On the Linkability and Security Analysis of Two Schnorr-Type Blind Signature Schemes. DASC 2009: 286-291 - [c33]Jianhong Zhang, Hua Chen, Shengnan Gao, Qin Geng:
Comment on a Digital Signature Scheme with Using Self-Certified Public Keys. IFITA (3) 2009: 678-680 - [c32]Yi Yu, Jianqiang Yi, Chengdong Li, Dongbin Zhao, Jianhong Zhang:
Fuzzy logic based adjustment control of a cable-driven auto-leveling parallel robot. IROS 2009: 2102-2107 - [c31]Jianhong Zhang, Yixian Yang, Xinxin Niu:
Efficient Provable Secure ID-Based Directed Signature Scheme without Random Oracle. ISNN (3) 2009: 318-327 - [c30]Jianhong Zhang:
On the Security of a Certificate-Based Signature Scheme and Its Improvement with Pairings. ISPEC 2009: 47-58 - [c29]Jianhong Zhang, Hua Chen:
Efficient Provable Secure ID-Based Anonymous Signcryption Scheme. PACCS 2009: 415-418 - [c28]Jianhong Zhang, Jianqiang Yi, Yi Yu:
Intelligent control of a four-rope-driven level-adjustment device with constrained outputs. ROBIO 2009: 1860-1865 - [c27]Jianhong Zhang, Yixian Yang, Xinxin Niu, Shengnan Gao, Hua Chen, Qin Geng:
An Improved Secure Identity-Based On-Line/Off-Line Signature Scheme. ISA 2009: 588-597 - [c26]Jianhong Zhang, Shengnan Gao, Hua Chen, Qin Geng:
A Novel ID-Based Anonymous Signcryption Scheme. APWeb/WAIM 2009: 604-610 - 2008
- [j10]Jianhong Zhang, Jane Mao:
A novel ID-based designated verifier signature scheme. Inf. Sci. 178(3): 766-773 (2008) - [c25]Jianhong Zhang, Qin Geng:
An Efficient Proxy Signature Scheme with Full-delegation. ICNSC 2008: 513-518 - [c24]Jianhong Zhang, Qin Geng:
On the Security of A Group Signature Scheme. ICNSC 2008: 1310-1314 - [c23]Jianhong Zhang, Cheng Ji:
On the Security of two Authenticated Encryption Schemes. ICNSC 2008: 1315-1319 - [c22]Jianhong Zhang, Jianjun Xie:
Security Analysis and their Improvement of Two Signature Schemes. ICYCS 2008: 1412-1417 - [c21]Jianhong Zhang, Qin Geng:
On the Security of Group Signature Scheme and Designated Verifier Signature Scheme. NAS 2008: 351-358 - 2007
- [j9]Jianhong Zhang, Wei Zou:
On the Security of Huang-Chang Multi-signature Schemes. Int. J. Netw. Secur. 5(1): 62-65 (2007) - [c20]Jianhong Zhang:
An Efficient Identity-Based Ring Signature Scheme and Its Extension. ICCSA (2) 2007: 63-74 - [c19]Jianhong Zhang, Jane Mao:
Security Analysis of Two Signature Schemes and Their Improved Schemes. ICCSA (1) 2007: 589-602 - [c18]Jianhong Zhang:
A verifiably encrypted signature scheme with strong unforgeability. Infoscale 2007: 66 - [c17]