Tianqi Zhou
Cited by
Cited by
Block design-based key agreement for group data sharing in cloud computing
J Shen, T Zhou, D He, Y Zhang, X Sun, Y Xiang
IEEE Transactions on Dependable and Secure Computing 16 (6), 996-1010, 2017
Anonymous and traceable group data sharing in cloud computing
J Shen, T Zhou, X Chen, J Li, W Susilo
IEEE Transactions on Information Forensics and Security 13 (4), 912-925, 2017
Privacy-preserving and lightweight key agreement protocol for V2G in the social Internet of Things
J Shen, T Zhou, F Wei, X Sun, Y Xiang
IEEE Internet of things Journal 5 (4), 2526-2536, 2017
Quantum cryptography for the future internet and the security analysis
T Zhou, J Shen, X Li, C Wang, J Shen
Security and Communication Networks 2018 (1), 8214619, 2018
Collaborative filtering-based recommendation system for big data
J Shen, T Zhou, L Chen
International Journal of Computational Science and Engineering 21 (2), 219-225, 2020
Movie recommendation system employing the user-based cf in cloud computing
T Zhou, L Chen, J Shen
2017 IEEE International Conference on Computational Science and Engineering …, 2017
An efficient and certificateless conditional privacy-preserving authentication scheme for wireless body area networks big data services
S Ji, Z Gui, T Zhou, H Yan, J Shen
IEEE Access 6, 69603-69611, 2018
Logarithmic encryption scheme for cyber–physical systems employing Fibonacci Q-matrix
T Zhou, J Shen, X Li, C Wang, H Tan
Future Generation Computer Systems 108, 1307-1313, 2020
Human-in-the-loop-aided privacy-preserving scheme for smart healthcare
T Zhou, J Shen, D He, P Vijayakumar, N Kumar
IEEE transactions on emerging topics in computational intelligence 6 (1), 6-15, 2020
A novel latin-square-based secret sharing for M2M communications
J Shen, T Zhou, X Liu, YC Chang
IEEE Transactions on Industrial Informatics 14 (8), 3659-3668, 2018
Lightweight authentication and matrix-based key agreement scheme for healthcare in fog computing
J Shen, H Yang, A Wang, T Zhou, C Wang
Peer-to-Peer Networking and Applications 12, 924-933, 2019
Searchable and secure edge pre-cache scheme for intelligent 6G wireless systems
C Wang, T Zhou, J Shen, W Wang, X Zhou
Future Generation Computer Systems 140, 129-137, 2023
Efficient data integrity auditing with corrupted data recovery for edge computing in enterprise multimedia security
D Liu, J Shen, P Vijayakumar, A Wang, T Zhou
Multimedia Tools and Applications 79, 10851-10870, 2020
Secure and efficient data sharing in dynamic vehicular networks
J Shen, T Zhou, J Lai, P Li, S Moh
IEEE Internet of Things Journal 7 (9), 8208-8217, 2020
Secure emergent data protection scheme for a space-terrestrial integrated network
J Shen, C Wang, S Ji, T Zhou, H Yang
IEEE Network 33 (1), 44-50, 2019
Hierarchical trust level evaluation for pervasive social networking
J Shen, T Zhou, CF Lai, J Li, X Li
IEEE Access 5, 1178-1187, 2017
Threshold Key Management Scheme for Blockchain-Based Intelligent Transportation Systems
T Zhou, J Shen, Y Ren, S Ji
Security and Communication Networks 2021, 2021
A flexible and privacy-preserving collaborative filtering scheme in cloud computing for VANETs
H Yang, J Shen, T Zhou, S Ji, P Vijayakumar
ACM Transactions on Internet Technology (TOIT) 22 (2), 1-19, 2021
A privacy‐preserving data transmission scheme based on oblivious transfer and blockchain technology in the smart healthcare
H Yang, J Shen, J Lu, T Zhou, X Xia, S Ji
Security and Communication Networks 2021 (1), 5781354, 2021
Mutual authentication scheme for smart devices in IoT-enabled smart home systems
Q Ma, H Tan, T Zhou
Computer Standards & Interfaces 86, 103743, 2023
The system can't perform the operation now. Try again later.
Articles 1–20