Security and Privacy for Storage and Computation in Cloud Computing L Wei, H Zhu, Z Cao, X Dong, W Jia, Y Chen, AV Vasilakos Information Sciences, 2013 | 731 | 2013 |
< formula formulatype= X Dong, L Wei, H Zhu, Z Cao, L Wang Vehicular Technology, IEEE Transactions on 60 (2), 580-591, 2011 | 172* | 2011 |
Fuzzy identity based signature with applications to biometric authentication P Yang, Z Cao, X Dong Computers & Electrical Engineering 37 (4), 532-540, 2011 | 144 | 2011 |
New public key cryptosystems using polynomials over non-commutative rings Z Cao, X Dong, L Wang Preprint, 35, 2007 | 62 | 2007 |
EP2DF: An Efficient Privacy-Preserving Data-Forwarding Scheme for Service-Oriented Vehicular Ad Hoc Networks X Dong, L Wei, H Zhu, Z Cao, L Wang IEEE transactions on vehicular technology 60 (2), 580-591, 2011 | 51* | 2011 |
Identity-based signature scheme based on quadratic residues ZC Chai, ZF Cao, XL Dong Science in China Series F: Information Sciences 50 (3), 373-380, 2007 | 38 | 2007 |
Threshold proxy re-signature P Yang, Z Cao, X Dong Performance, Computing and Communications Conference, 2008. IPCCC 2008. IEEE …, 2008 | 34 | 2008 |
An application of a lower bound for linear forms in two logarithms to the Terai-Jesmanowicz conjecture Z Cao, X Dong Acta Arithmetica 110, 153-164, 2003 | 34 | 2003 |
AN AUTHENTICATION METHOD, SYSTEM, SERVER AND USER NODE Z Cao, X Dong, R LU, J Wei EP Patent 2,093,927, 2009 | 27* | 2009 |
Authentication method, system, server, and user node Z Cao, X Dong, R Lu, J Wei US Patent App. 12/497,930, 2009 | 27* | 2009 |
AN AUTHENTICATION METHOD, SYSTEM, SERVER AND USER NODE Z CAO, X DONG, R LU, J WEI WO Patent 2,009,059,535, 2009 | 27* | 2009 |
On the Terai-Jesmanowicz conjecture ZF Cao, XL Dong Publ. Math. Debrecen 61 (3-4), 253-265, 2002 | 26 | 2002 |
The Diophantine equation Z Cao, X Dong Proceedings of the Japan Academy, Series A, Mathematical Sciences 77 (1), 1-4, 2001 | 25 | 2001 |
The Terai–Jesmanowicz conjecture concerning the equation ax+ by= cz XL Dong, ZF Cao Chinese Math. Ann 21, 709-714, 2000 | 24* | 2000 |
On Terai's conjecture Z Cao, X Dong Proceedings of the Japan Academy, Series A, Mathematical Sciences 74 (8 …, 1998 | 22 | 1998 |
Identity based signature scheme based on cubic residues DS Xing, ZF Cao, XL Dong Science China Information Sciences 54 (10), 2001-2012, 2011 | 20 | 2011 |
Designing efficient proxy signature schemes for mobile communication RX Lu, XL Dong, ZF Cao Science in China Series F: Information Sciences 51 (2), 183-195, 2008 | 20 | 2008 |
An Efficient Privacy Preserving Data Aggregation Scheme with Constant Communication Overheads for Wireless Sensor Networks P Yang, Z Cao, X Dong, TA Zia Communications Letters, IEEE 15 (11), 1205-1207, 2011 | 19 | 2011 |
A new conjecture concerning the Diophantine equation Z Cao, X Dong, Z Li Proceedings of the Japan Academy, Series A, Mathematical Sciences 78 (10 …, 2002 | 18 | 2002 |
Designated verifier proxy signature scheme from bilinear pairings R Lu, Z Cao, X Dong, R Su Computer and Computational Sciences, 2006. IMSCCS'06. First International …, 2006 | 16 | 2006 |