Dengzhi Liu
Dengzhi Liu
Jiangsu Ocean University
Verified email at
Cited by
Cited by
A secure cloud-assisted urban data sharing framework for ubiquitous-cities
J Shen, D Liu, J Shen, Q Liu, X Sun
Pervasive and mobile Computing 41, 219-230, 2017
Secure real-time traffic data aggregation with batch verification for vehicular cloud in VANETs
J Shen, D Liu, X Chen, J Li, N Kumar, P Vijayakumar
IEEE Transactions on Vehicular Technology 69 (1), 807-817, 2019
Secure authentication in cloud big data with hierarchical attribute authorization structure
J Shen, D Liu, Q Liu, X Sun, Y Zhang
IEEE Transactions on Big Data 7 (4), 668-677, 2017
Toward secure distributed data storage with error locating in blockchain enabled edge computing
D Liu, Y Zhang, D Jia, Q Zhang, X Zhao, H Rong
Computer Standards & Interfaces 79, 103560, 2022
Flexible data integrity checking with original data recovery in IoT-enabled maritime transportation systems
D Liu, Y Zhang, W Wang, K Dev, SA Khowaja
IEEE Transactions on Intelligent Transportation Systems 24 (2), 2618-2629, 2021
Secure verifiable database supporting efficient dynamic operations in cloud computing
J Shen, D Liu, MZA Bhuiyan, J Shen, X Sun, A Castiglione
IEEE Transactions on Emerging Topics in Computing 8 (2), 280-290, 2017
Algebraic signatures-based data integrity auditing for efficient data dynamics in cloud computing
J Shen, D Liu, D He, X Huang, Y Xiang
IEEE Transactions on Sustainable Computing 5 (2), 161-173, 2017
Trustworthiness evaluation-based routing protocol for incompletely predictable vehicular ad hoc networks
J Shen, C Wang, A Castiglione, D Liu, C Esposito
IEEE Transactions on Big Data 8 (1), 48-59, 2017
Evidential quality preserving of electronic record in cloud storage
Y Ren, J Shen, D Liu, J Wang, JU Kim
網際網路技術學刊 17 (6), 1125-1132, 2016
Efficient data integrity auditing with corrupted data recovery for edge computing in enterprise multimedia security
D Liu, J Shen, P Vijayakumar, A Wang, T Zhou
Multimedia Tools and Applications 79, 10851-10870, 2020
Lightweight and practical node clustering authentication protocol for hierarchical wireless sensor networks
D Liu, J Shen, A Wang, C Wang
International Journal of Sensor Networks 27 (2), 95-102, 2018
Secure real-time image protection scheme with near-duplicate detection in cloud computing
D Liu, J Shen, A Wang, C Wang
Journal of Real-Time Image Processing 17 (1), 175-184, 2020
A secure identity-based dynamic group data sharing scheme for cloud computing
J Shen, DZ Liu, CF Lai, YJ Ren, XM Sun
網際網路技術學刊, 2016
Efficient cloud-aided verifiable secret sharing scheme with batch verification for smart cities
J Shen, D Liu, X Sun, F Wei, Y Xiang
Future Generation Computer Systems 109, 450-456, 2020
A survey on the research of indoor RFID positioning system
J Shen, C Jin, D Liu
Cloud Computing and Security: Second International Conference, ICCCS 2016 …, 2016
An authorized identity authentication-based data access control scheme in cloud
J Shen, D Liu, Q Liu, B Wang, Z Fu
2016 18th International Conference on Advanced Communication Technology …, 2016
Anonymous data collection scheme for cloud-aided mobile edge networks
A Wang, J Shen, C Wang, H Yang, D Liu
Digital Communications and Networks 6 (2), 223-228, 2020
An Enhanced Cloud Data Storage Auditing Protocol Providing Strong Security and Efficiency for Smart City.
J Shen, D Liu, Q Liu, D He, X Sun
Journal of Information Science & Engineering 33 (4), 2017
Privacy preserving search schemes over encrypted cloud data: a comparative survey
J Shen, D Liu, J Shen, H Tan, D He
2015 First International Conference on Computational Intelligence Theory …, 2015
Secure distributed data integrity auditing with high efficiency in 5G-enabled software-defined edge computing
D Liu, Z Li, D Jia
Cyber Security and Applications 1, 100004, 2023
The system can't perform the operation now. Try again later.
Articles 1–20