Shen, Mingwu
12  Ergebnisse:
Personensuche X
?
1

Dendrimer-Based Tumor-targeted Systems:

, In: New Nanomaterials and Techniques for Tumor-targeted Systems,
Ouyang, Zhijun ; Li, Du ; Shen, Mingwu. - p. 337-369 , 2020
 
?
2

Identity-Based Key Verifiable Inner Product Functional Encr..:

, In: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; Blockchain Technology and Emerging Applications,
Zhang, Mingwu ; He, Chao ; Shen, Gang - p. 3-22 , 2024
 
?
3

A Federated Learning Assisted Conditional Privacy Preservin..:

, In: Cyberspace Safety and Security; Lecture Notes in Computer Science,
Xia, Zhe ; Shu, Yifeng ; Shen, Hua. - p. 16-35 , 2022
 
?
4

A Multi-task Mobile Crowdsensing Scheme with Conditional Pr..:

, In: Communications in Computer and Information Science; Emerging Information Security and Applications,
Xia, Zhe ; Liu, Shiyun ; Huang, Yichen.. - p. 21-36 , 2022
 
?
5

Privacy-Preserving Multi-party Neural Network Learning Over..:

, In: 2022 IEEE 24th Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, Cloud & Big Data Systems & Application (HPCC/DSS/SmartCity/DependSys),
Liu, Fengxiao ; Shen, Gang ; Zhang, Mingwu - p. 1216-1221 , 2022
 
?
6

A Privacy-Preserving Federated Learning with Mutual Verific..:

, In: Communications in Computer and Information Science; Security and Privacy in Social Networks and Big Data,
Zhang, Mingwu ; Cui, Chenmei ; Shen, Gang. - p. 212-226 , 2022
 
?
7

Key Exposure Resistant Group Key Agreement Protocol:

, In: Provable and Practical Security; Lecture Notes in Computer Science,
Zhou, Tianqi ; Shen, Jian ; Ji, Sai.. - p. 83-97 , 2021
 
?
8

An Efficient and Privacy-Preserving Physiological Case Clas..:

, In: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; Security and Privacy in New Computing Environments,
Shen, Gang ; Gui, Yumin ; Zhang, Mingwu... - p. 172-185 , 2021
 
?
9

Cloud-Based Data-Sharing Scheme Using Verifiable and CCA-Se..:

, In: Information Security and Cryptology; Lecture Notes in Computer Science,
Zhang, Mingwu ; Jiang, Yan ; Shen, Hua.. - p. 240-259 , 2019
 
?
10

Provably Secure Proactive Secret Sharing Without the Adjace..:

, In: Provable Security; Lecture Notes in Computer Science,
Xia, Zhe ; Yang, Bo ; Zhou, Yanwei... - p. 247-264 , 2019
 
?
11

A Fair (t, n)-Threshold Secret Sharing Scheme with Efficien..:

, In: IFIP Advances in Information and Communication Technology; Trust Management XIII,
Shen, Hua ; Sun, Daijie ; Zhao, Lan. - p. 122-132 , 2019
 
?
12

A Fair and Efficient Secret Sharing Scheme Based on Cloud A..:

, In: Machine Learning for Cyber Security; Lecture Notes in Computer Science,
Zhang, Mingwu ; Chen, Xiao ; Shen, Gang. - p. 348-360 , 2019
 
1-12