default search action
Dengzhi Liu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j20]Dengzhi Liu, Geng Yu, Zhaoman Zhong, Yuanzhao Song:
Secure multi-party computation with secret sharing for real-time data aggregation in IIoT. Comput. Commun. 224: 159-168 (2024) - [j19]Dengzhi Liu, Yongdong Ding, Geng Yu, Zhaoman Zhong, Yuanzhao Song:
Privacy-preserving dynamic auditing for regenerating code-based storage in cloud-fog-assisted IIoT. Internet Things 25: 101084 (2024) - 2023
- [j18]Dengzhi Liu, Fan Sun, Weizheng Wang, Kapal Dev:
Distributed Computation Offloading with Low Latency for Artificial Intelligence in Vehicular Networking. IEEE Commun. Stand. Mag. 7(1): 74-80 (2023) - [j17]Dengzhi Liu, Zhimin Li, Dongbao Jia:
Secure distributed data integrity auditing with high efficiency in 5G-enabled software-defined edge computing. Cyber Secur. Appl. 1: 100004 (2023) - [j16]Dengzhi Liu, Yong Zhang, Weizheng Wang, Kapal Dev, Sunder Ali Khowaja:
Flexible Data Integrity Checking With Original Data Recovery in IoT-Enabled Maritime Transportation Systems. IEEE Trans. Intell. Transp. Syst. 24(2): 2618-2629 (2023) - 2022
- [j15]Dengzhi Liu, Yong Zhang, Dongbao Jia, Qiaosheng Zhang, Xuefeng Zhao, Huan Rong:
Toward secure distributed data storage with error locating in blockchain enabled edge computing. Comput. Stand. Interfaces 79: 103560 (2022) - [j14]Jian Shen, Chen Wang, Aniello Castiglione, Dengzhi Liu, Christian Esposito:
Trustworthiness Evaluation-Based Routing Protocol for Incompletely Predictable Vehicular Ad Hoc Networks. IEEE Trans. Big Data 8(1): 48-59 (2022) - 2021
- [j13]Jian Shen, Dengzhi Liu, Qi Liu, Xingming Sun, Yan Zhang:
Secure Authentication in Cloud Big Data with Hierarchical Attribute Authorization Structure. IEEE Trans. Big Data 7(4): 668-677 (2021) - 2020
- [j12]Anxi Wang, Jian Shen, Chen Wang, Huijie Yang, Dengzhi Liu:
Anonymous data collection scheme for cloud-aided mobile edge networks. Digit. Commun. Networks 6(2): 223-228 (2020) - [j11]Jian Shen, Dengzhi Liu, Xingming Sun, Fushan Wei, Yang Xiang:
Efficient cloud-aided verifiable secret sharing scheme with batch verification for smart cities. Future Gener. Comput. Syst. 109: 450-456 (2020) - [j10]Dengzhi Liu, Jian Shen, Anxi Wang, Chen Wang:
Secure real-time image protection scheme with near-duplicate detection in cloud computing. J. Real Time Image Process. 17(1): 175-184 (2020) - [j9]Dengzhi Liu, Jian Shen, Pandi Vijayakumar, Anxi Wang, Tianqi Zhou:
Efficient data integrity auditing with corrupted data recovery for edge computing in enterprise multimedia security. Multim. Tools Appl. 79(15-16): 10851-10870 (2020) - [j8]Wenying Zheng, Dengzhi Liu, Xiong Li, Arun Kumar Sangaiah:
Secure sustainable storage auditing protocol (SSSAP) with efficient key updates for cloud computing. Sustain. Comput. Informatics Syst. 28: 100237 (2020) - [j7]Jian Shen, Dengzhi Liu, Md. Zakirul Alam Bhuiyan, Jun Shen, Xingming Sun, Aniello Castiglione:
Secure Verifiable Database Supporting Efficient Dynamic Operations in Cloud Computing. IEEE Trans. Emerg. Top. Comput. 8(2): 280-290 (2020) - [j6]Jian Shen, Dengzhi Liu, Debiao He, Xinyi Huang, Yang Xiang:
Algebraic Signatures-Based Data Integrity Auditing for Efficient Data Dynamics in Cloud Computing. IEEE Trans. Sustain. Comput. 5(2): 161-173 (2020) - [j5]Jian Shen, Dengzhi Liu, Xiaofeng Chen, Jin Li, Neeraj Kumar, Pandi Vijayakumar:
Secure Real-Time Traffic Data Aggregation With Batch Verification for Vehicular Cloud in VANETs. IEEE Trans. Veh. Technol. 69(1): 807-817 (2020)
2010 – 2019
- 2019
- [j4]Jian Shen, Xinzhao Jiang, Youngju Cho, Dengzhi Liu, Tianqi Zhou:
Two-Factor-Based Public Data Protection Scheme in Smart Ocean Management. Sensors 19(1): 129 (2019) - [c14]Jian Shen, Xinzhao Jiang, Dengzhi Liu, Tianqi Zhou:
Cloud-assisted Two-Factor Protection Mechanism for Public Data in Smart Campus. ICNC 2019: 719-723 - 2018
- [j3]Dengzhi Liu, Jian Shen, Anxi Wang, Chen Wang:
Lightweight and practical node clustering authentication protocol for hierarchical wireless sensor networks. Int. J. Sens. Networks 27(2): 95-102 (2018) - [c13]Jian Shen, Dengzhi Liu, Xiaofeng Chen, Xinyi Huang, Jiageng Chen, Mingwu Zhang:
Secure Publicly Verifiable Computation with Polynomial Commitment in Cloud Computing. ACISP 2018: 417-430 - [c12]Dengzhi Liu, Jian Shen, Yuling Chen, Chen Wang, Tianqi Zhou, Anxi Wang:
Privacy-Preserving Data Outsourcing with Integrity Auditing for Lightweight Devices in Cloud Computing. Inscrypt 2018: 223-239 - [c11]Jian Shen, Dengzhi Liu, Qi Liu, Zhihua Xia, Tianqi Zhou:
A Novel Authentication Protocol with Tree-based Signature for Green Cloud Computing. ICNC 2018: 843-848 - 2017
- [j2]Jian Shen, Dengzhi Liu, Qi Liu, Debiao He, Xingming Sun:
An Enhanced Cloud Data Storage Auditing Protocol Providing Strong Security and Efficiency for Smart City. J. Inf. Sci. Eng. 33(4): 923-938 (2017) - [j1]Jian Shen, Dengzhi Liu, Jun Shen, Qi Liu, Xingming Sun:
A secure cloud-assisted urban data sharing framework for ubiquitous-cities. Pervasive Mob. Comput. 41: 219-230 (2017) - [c10]Anxi Wang, Shuzhen Pan, Chen Wang, Jian Shen, Dengzhi Liu:
A Novel Clustering Solution for Wireless Sensor Networks. GPC 2017: 313-322 - [c9]Jian Shen, Meng Feng, Dengzhi Liu, Chen Wang, Jiachen Jiang, Xingming Sun:
Enhanced Remote Password-Authenticated Key Agreement Based on Smart Card Supporting Password Changing. ISPEC 2017: 454-467 - [c8]Jian Shen, Tiantian Miao, Qi Liu, Sai Ji, Chen Wang, Dengzhi Liu:
S-SurF: An Enhanced Secure Bulk Data Dissemination in Wireless Sensor Networks. SpaCCS 2017: 395-408 - 2016
- [c7]Sai Ji, Dengzhi Liu, Jian Shen:
Exploiting Group Signature to Implement User Authentication in Cloud Computing. CSA/CUTE 2016: 323-331 - [c6]Sai Ji, Dengzhi Liu, Jian Shen:
Localization Technology in Wireless Sensor Networks Using RSSI and LQI: A Survey. CSA/CUTE 2016: 342-351 - [c5]Jian Shen, Chen Jin, Dengzhi Liu:
A Survey on the Research of Indoor RFID Positioning System. ICCCS (2) 2016: 264-274 - [c4]Jian Shen, Chen Wang, Aniello Castiglione, Dengzhi Liu, Christian Esposito:
Greedy Probability-Based Routing Protocol for Incompletely Predictable Vehicular Ad-hoc Network. SpaCCS Workshops 2016: 208-217 - 2015
- [c3]Jian Shen, Dengzhi Liu, Yongjun Ren, Sai Ji, Jin Wang, Dongmin Choi:
A Mobile-Sink Based Energy Efficiency Clustering Routing Algorithm for WSNs in Coal Mine. CBD 2015: 267-274 - [c2]Jin Wang, Dengzhi Liu, Kai Zhang, Xuedong Chen, Jeong-Uk Kim:
A novel real-time service architecture based on driver state detecting for improving road safety. ICCE-TW 2015: 53-54 - [c1]Jin Wang, Kai Zhang, Dengzhi Liu, Xuedong Chen, Jeong-Uk Kim:
A three-tiers service architecture based on outdoor monitoring for epilepsy patients. ICCE-TW 2015: 68-69
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-20 20:32 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint