default search action
Guozhen Shi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j12]Yonghua Zhan, Feng Yuan, Rui Shi, Guozhen Shi, Chen Dong:
PriTKT: A Blockchain-Enhanced Privacy-Preserving Electronic Ticket System for IoT Devices. Sensors 24(2): 496 (2024) - [j11]Rui Shi, Yang Yang, Yingjiu Li, Huamin Feng, Guozhen Shi, HweeHwa Pang, Robert H. Deng:
Double Issuer-Hiding Attribute-Based Credentials From Tag-Based Aggregatable Mercurial Signatures. IEEE Trans. Dependable Secur. Comput. 21(4): 2585-2602 (2024) - [c14]Rongna Xie, Xiaoyu Chen, Xinru Zhang, Guang Yang, Guozhen Shi:
Block Cipher Algorithms Identification Scheme Based on KFDA. ICIC (9) 2024: 13-24 - [c13]Rongna Xie, Xiaoyu Chen, Xinru Zhang, Guozhen Shi:
Block Cipher Algorithm Identification Based on CNN-Transformer Fusion Model. PRCV (11) 2024: 97-110 - 2023
- [j10]Liwei Xu, Han Wu, Jianguo Xie, Qiong Yuan, Ying Sun, Guozhen Shi, Shoushan Luo:
An SSL-PUF Based Access Authentication and Key Distribution Scheme for the Space-Air-Ground Integrated Network. Entropy 25(5): 760 (2023) - 2021
- [j9]Rongna Xie, Hui Li, Guozhen Shi, Yunchuan Guo, Ben Niu, Mang Su:
Provenance-based data flow control mechanism for Internet of things. Trans. Emerg. Telecommun. Technol. 32(5) (2021) - [c12]Rongna Xie, Xiaonan Fan, Jiayu Zhu, Guozhen Shi, Jiapeng Lou, Yuxin Huang:
Research on Label Based Data Flow Control Mechanism. DSC 2021: 233-239 - 2020
- [j8]Mingxin Ma, Guozhen Shi, Xinyi Shi, Mang Su, Fenghua Li:
Revocable Certificateless Public Key Encryption With Outsourced Semi-Trusted Cloud Revocation Agent. IEEE Access 8: 148157-148168 (2020) - [j7]Rongna Xie, Guozhen Shi, Yunchuan Guo, Fenghua Li:
A topic-centric access control model for the publish/subscribe paradigm. Concurr. Comput. Pract. Exp. 32(9) (2020) - [j6]Liang Fang, Guozhen Shi, Lianhai Wang, Yongjun Li, Shujiang Xu, Yunchuan Guo:
Incentive mechanism for cooperative authentication: An evolutionary game approach. Inf. Sci. 527: 369-381 (2020) - [j5]Jiafeng Hua, Guozhen Shi, Hui Zhu, Fengwei Wang, Ximeng Liu, Hao Li:
CAMPS: Efficient and privacy-preserving medical primary diagnosis over outsourced cloud. Inf. Sci. 527: 560-575 (2020)
2010 – 2019
- 2019
- [j4]Mingxin Ma, Guozhen Shi, Fenghua Li:
Privacy-Oriented Blockchain-Based Distributed Key Management Architecture for Hierarchical Access Control in the IoT Scenario. IEEE Access 7: 34045-34059 (2019) - [j3]Li Li, Fenghua Li, Guozhen Shi:
Multi-Service Oriented Stream Data Synchronization Scheme for Multicore Cipher Chips. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 102-A(1): 48-55 (2019) - [c11]Mingxin Ma, Xiaotong Yang, Guozhen Shi, Fenghua Li:
Enhanced blockchain based key management scheme against key exposure attack. AIIPCC 2019: 68:1-68:6 - [c10]Mingxin Ma, Xiaotong Yang, Guozhen Shi, Fenghua Li:
Hierarchical Key Management Scheme with Multilevel Secure Access. CyberC 2019: 97-102 - [c9]Rongna Xie, Yazhe Wang, Guozhen Shi, Lin Yuan, Quanqi Li:
Pre-authorization Usage Control Mechanism for Cross-Domain in Cloud. DPTA 2019: 881-892 - [i1]Weiqing You, Guozhen Shi, Xiaoming Chen, Jian Qi, Chuang Qing:
Research on a Hybrid System With Perfect Forward Secrecy. CoRR abs/1910.04351 (2019) - 2018
- [j2]Li Li, Fenghua Li, Guozhen Shi, Kui Geng:
An Efficient Stream Data Processing Model for Multiuser Cryptographic Service. J. Electr. Comput. Eng. 2018: 3917827:1-3917827:10 (2018) - [j1]Li Li, Fenghua Li, Kui Geng, Guozhen Shi:
Design of Multi Cipher Processing Architecture for Random Cross Access. Microprocess. Microsystems 61: 336-343 (2018) - 2017
- [c8]Fenghua Li, Fangxin Xiong, Chao Li, Lihua Yin, Guozhen Shi, Boxiu Tian:
SRAM: A State-Aware Risk Assessment Model for Intrusion Response. DSC 2017: 232-237 - [c7]Yunfei Ci, Guozhen Shi, Feng Yang, Jiawen Diao, Cuijie Liu, Weihua Mao:
Design and Implementation of the Components of the Symmetric Cryptographic Algorithm. DSC 2017: 483-487 - 2016
- [c6]Guozhen Shi, Yunfei Ci, Rongna Xie, Haojie Wang, Jiqiang Zeng:
A Dual Threshold Secret Sharing Scheme among Weighted Participants of Special Right. DSC 2016: 104-108 - [c5]Mang Su, Anmin Fu, Yan Yu, Guozhen Shi:
Resource-centric Dynamic Access Control in Cloud. Trustcom/BigDataSE/ISPA 2016: 1957-1962 - 2014
- [c4]Guozhen Shi, Mang Su, Fenghua Li, Jiapeng Lou, Qiong Huang:
A User-Based Document Management Mechanism in Cloud. CIS 2014: 377-381 - [c3]Guozhen Shi, Ying Shen, Fenghua Li, Mang Su:
A Reliable Supervision Model and Implementation for the Trading of Digital Works. CIS 2014: 484-488 - [c2]Guozhen Shi, Ying Shen, Fenghua Li, Mang Su, Dong Liu:
Research on Credible Regulation Mechanism for the Trading of Digital Works. SecureComm (1) 2014: 519-523
2000 – 2009
- 2008
- [c1]Jun Yang, Tao Zhang, Jingyan Song, Hanxu Sun, Guozhen Shi, Yao Chen:
Redundant design of A CAN BUS Testing and Communication System for space robot arm. ICARCV 2008: 1894-1898
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-13 23:53 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint