default search action
Zuowen Tan
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j30]Lianfu Zhang, Guangwei Fang, Zuowen Tan:
FedCCW: a privacy-preserving Byzantine-robust federated learning with local differential privacy for healthcare. Clust. Comput. 28(3): 182 (2025) - [j29]Zuowen Tan
, Faxin Cao
, Xingzhi Liu
, Jintao Jiao
, Wenlei You, Judou Lin
:
LPPMM-DA: Lightweight Privacy-Preserving Multi-Dimensional and Multi-Subset Data Aggregation for Smart Grid. IEEE Trans. Smart Grid 16(2): 1801-1816 (2025) - 2024
- [j28]Zuowen Tan, Jintao Jiao
, Yanliang Chen:
Provably secure lightweight certificateless lattice-based authenticated key exchange scheme for IIoT. Concurr. Comput. Pract. Exp. 36(8) (2024) - [j27]Zuowen Tan
, Yanliang Chen
, Mengjiang Yu, Jintao Jiao
, Faxin Cao
:
Secure Data Sharing Scheme Based on Dual Attribute Conversion for Cloud-Assisted IoT. IEEE Internet Things J. 11(20): 33577-33591 (2024) - 2021
- [j26]Zuowen Tan
:
Privacy-Preserving Two-Factor Key Agreement Protocol Based on Chebyshev Polynomials. Secur. Commun. Networks 2021: 6697898:1-6697898:21 (2021) - [j25]Zuowen Tan, Haohan Zhang
, Peiyi Hu, Rui Gao:
Distributed Outsourced Privacy-Preserving Gradient Descent Methods among Multiple Parties. Secur. Commun. Networks 2021: 8876893:1-8876893:16 (2021) - [j24]Xiangjie Sui, Mengna Ding, Jiebin Yan, Yuming Fang, Yifan Zuo
, Zuowen Tan:
Objective quality assessment of synthesized images by local variation measurement. Signal Process. Image Commun. 92: 116096 (2021)
2010 – 2019
- 2019
- [c7]Mengna Ding, Yuming Fang, Yifan Zuo
, Zuowen Tan:
Blind Quality Assessment for DIBR-Synthesized Images Based on Chromatic and Disoccluded Information. PRCV (2) 2019: 620-631 - 2018
- [j23]Zuowen Tan
:
Secure Delegation-Based Authentication for Telecare Medicine Information Systems. IEEE Access 6: 26091-26110 (2018) - 2016
- [j22]Zuowen Tan:
A privacy-preserving multi-server authenticated key-agreement scheme based on Chebyshev chaotic maps. Secur. Commun. Networks 9(11): 1384-1397 (2016) - 2015
- [j21]Zuowen Tan:
An efficient pairing-free identity-based authenticated group key agreement protocol. Int. J. Commun. Syst. 28(3): 534-545 (2015) - [j20]Zuowen Tan:
An Improved Anonymous Authentication Scheme for Roaming Services. J. Inf. Hiding Multim. Signal Process. 6(2): 389-397 (2015) - 2014
- [j19]Zuowen Tan:
A User Anonymity Preserving Three-Factor Authentication Scheme for Telecare Medicine Information Systems. J. Medical Syst. 38(3): 16 (2014) - 2013
- [j18]Zuowen Tan:
An Enhanced ID-based Authenticated Multiple Key Agreement Protocol. Inf. Technol. Control. 42(1): 21-28 (2013) - [j17]Zuowen Tan, Jianfeng Wang:
Security Analysis on a Timestamp-based Remote User Authentication Scheme. J. Comput. 8(11): 2838-2843 (2013) - [j16]Zuowen Tan:
Efficient pairing-free provably secure identity-based proxy blind signature scheme. Secur. Commun. Networks 6(5): 593-601 (2013) - [j15]Zuowen Tan:
A communication and computation-efficient three-party authenticated key agreement protocol. Secur. Commun. Networks 6(7): 854-863 (2013) - 2012
- [j14]Zuowen Tan:
An efficient identity-based tripartite authenticated key agreement protocol. Electron. Commer. Res. 12(4): 505-518 (2012) - [j13]Zuowen Tan:
Identity-based Authenticated Multiple Key Agreement Protocol with PKG Forward Security. KSII Trans. Internet Inf. Syst. 6(8): 1982-1997 (2012) - [j12]Zuowen Tan:
A lightweight conditional privacy-preserving authentication and access control scheme for pervasive computing environments. J. Netw. Comput. Appl. 35(6): 1839-1846 (2012) - 2011
- [j11]Zuowen Tan:
Efficient identity-based authenticated multiple key exchange protocol. Comput. Electr. Eng. 37(2): 191-198 (2011) - [j10]Zuowen Tan:
An Off-line Electronic Cash Scheme Based on Proxy Blind Signature. Comput. J. 54(4): 505-512 (2011) - [j9]Zuowen Tan:
An Authentication and Key Agreement Scheme with Key Confirmation and Privacy-preservation for Multi-server Environments. J. Comput. 6(11): 2295-2301 (2011) - 2010
- [j8]Zuowen Tan:
An Improvement on A Three-Party Authentication Key Exchange Protocol Using Elliptic Curve Cryptography. J. Convergence Inf. Technol. 5(4): 120-129 (2010) - [j7]Zuowen Tan:
A Privacy-Preserving Mutual Authentication Protocol for Vehicle Ad Hoc Networks. J. Convergence Inf. Technol. 5(7): 180-186 (2010) - [j6]Zuowen Tan:
An Enhanced Three-Party Authentication Key Exchange Protocol for Mobile Commerce Environments. J. Commun. 5(5): 436-443 (2010) - [j5]Zuowen Tan:
An E-Cash Scheme Based on Proxy Blind Signature from Bilinear Pairings. J. Comput. 5(11): 1638-1645 (2010) - [j4]Zuowen Tan:
Analysis and Improvement of a User Authentication Improved Protocol. J. Networks 5(5): 622-630 (2010) - [j3]Zuowen Tan:
A new threshold authenticated encryption scheme using labor-division signature. J. Syst. Sci. Complex. 23(6): 1183-1194 (2010) - [j2]Zuowen Tan:
Improvement on a Threshold Authenticated Encryption Scheme. J. Softw. 5(7): 697-704 (2010)
2000 – 2009
- 2009
- [j1]Zuowen Tan, Zhuojun Liu:
Cryptanalysis and Improvement on a Threshold Proxy Signature Scheme. J. Inf. Sci. Eng. 25(2): 619-631 (2009) - [c6]Zuowen Tan:
An Improved Identity-Based Group Signature Scheme. CIS (1) 2009: 423-427 - 2008
- [c5]Zuowen Tan, Qi Wu:
Study of Linearly Cross-Coupled Chaotic Systems for a Random Bit Generator. CIS (2) 2008: 267-272 - [c4]Zuowen Tan, Hongguang Xiao:
Hierarchical Proxy Blind Signature: A Solution to E-cash in the Real World. ICYCS 2008: 1476-1480 - 2007
- [c3]Zuowen Tan:
Improvement on a Generalized Scheme of Proxy Signature Based on Elliptic Curves. CIS 2007: 677-681 - 2005
- [c2]Zuowen Tan, Zhuojun Liu, Mingsheng Wang:
On the Security of Some Nonrepudiable Threshold Proxy Signature Schemes. ISPEC 2005: 374-385 - 2004
- [c1]Zuowen Tan, Zhuojun Liu:
Provably secure delegation-by-certification proxy signature schemes. InfoSecu 2004: 38-43 - [i1]Zuowen Tan, Zhuojun Liu:
Provably Secure Delegation-by-Certification Proxy Signature Schemes. IACR Cryptol. ePrint Arch. 2004: 148 (2004)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-10 20:48 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint