×
Author ID: lu.rongxing Recent zbMATH articles by "Lu, Rongxing"
Published as: Lu, Rongxing; Lu, Rong Xing

Publications by Year

Citations contained in zbMATH Open

19 Publications have been cited 36 times in 31 Documents Cited by Year
Designing efficient proxy signature schemes for mobile communication. Zbl 1137.94010
Lu, Rongxing; Dong, Xiaolei; Cao, Zhenfu
4
2008
Designated verifier proxy signature scheme with message recovery. Zbl 1076.94032
Lu, Rongxing; Cao, Zhenfu
4
2005
Provably secure proxy-protected signature schemes based on factoring. Zbl 1072.94013
Zhou, Yuan; Cao, Zhenfu; Lu, Rongxing
4
2005
A new deniable authentication protocol from bilinear pairings. Zbl 1076.94031
Lu, Rongxing; Cao, Zhenfu
3
2005
Threshold undeniable signature scheme based on conic. Zbl 1074.94009
Lu, Rong Xing; Cao, Zhen Fu; Zhou, Yuan
3
2005
A robust \((k,n)+1\) threshold proxy signature scheme based on factoring. Zbl 1075.94010
Lu, Rongxing; Cao, Zhenfu; Zhu, Haojin
3
2005
Robust ID-based threshold signcryption scheme from pairings. Zbl 1091.94505
Duan, Shanshan; Cao, Zhenfu; Lu, Rongxing
2
2005
Proxy blind multi-signature scheme without a secure channel. Zbl 1072.94011
Lu, Rongxing; Cao, Zhenfu; Zhou, Yuan
2
2005
New \((t, n)\) threshold directed signature scheme with provable security. Zbl 1134.94375
Lu, Rongxing; Lin, Xiaodong; Cao, Zhenfu; Shao, Jun; Liang, Xiaohui
2
2008
Path selection of a train of spherical capsules in a branched microchannel. Zbl 1516.76088
Lu, R. X.; Wang, Z.; Salsac, A.-V.; Barthès-Biesel, D.; Wang, W.; Sui, Y.
2
2021
Efficient remote user authentication scheme using smart card. Zbl 1088.68597
Lu, Rongxing; Cao, Zhenfu
1
2005
An improved deniable authentication protocol. Zbl 1129.94036
Shao, Jun; Cao, Zhenfu; Lu, Rongxing
1
2006
EFADS: efficient, flexible and anonymous data sharing protocol for cloud computing with proxy re-encryption. Zbl 1405.68023
Wei, Guiyi; Lu, Rongxing; Shao, Jun
1
2014
Secure and flexible cloud-assisted association rule mining over horizontally partitioned databases. Zbl 1372.68086
Huang, Cheng; Lu, Rongxing; Choo, Kim-Kwang Raymond
1
2017
A privacy-preserving outsourced functional computation framework across large-scale multiple encrypted domains. Zbl 1360.94320
Liu, Ximeng; Qin, Baodong; Deng, Robert H.; Lu, Rongxing; Ma, Jianfeng
1
2016
User collusion avoidance scheme for privacy-preserving decentralized key-policy attribute-based encryption. Zbl 1360.94329
Rahulamathavan, Yogachandran; Veluru, Suresh; Han, Jinguang; Li, Fei; Rajarajan, Muttukrishnan; Lu, Rongxing
1
2016
A simple deniable authentication protocol based on the Diffie-Hellman algorithm. Zbl 1158.68008
Lu, Rongxing; Lin, Xiaodong; Cao, Zhenfu; Qin, Liuquan; Liang, Xiaohui
1
2008
Efficient privacy-preserving data merging and skyline computation over multi-source encrypted data. Zbl 1451.68097
Zheng, Yandong; Lu, Rongxing; Li, Beibei; Shao, Jun; Yang, Haomiao; Raymond Choo, Kim-Kwang
1
2019
A Markov adversary model to detect vulnerable iOS devices and vulnerabilities in iOS apps. Zbl 1411.94058
D’Orazio, Christian J.; Lu, Rongxing; Choo, Kim-Kwang Raymond; Vasilakos, Athanasios V.
1
2017
Path selection of a train of spherical capsules in a branched microchannel. Zbl 1516.76088
Lu, R. X.; Wang, Z.; Salsac, A.-V.; Barthès-Biesel, D.; Wang, W.; Sui, Y.
2
2021
Efficient privacy-preserving data merging and skyline computation over multi-source encrypted data. Zbl 1451.68097
Zheng, Yandong; Lu, Rongxing; Li, Beibei; Shao, Jun; Yang, Haomiao; Raymond Choo, Kim-Kwang
1
2019
Secure and flexible cloud-assisted association rule mining over horizontally partitioned databases. Zbl 1372.68086
Huang, Cheng; Lu, Rongxing; Choo, Kim-Kwang Raymond
1
2017
A Markov adversary model to detect vulnerable iOS devices and vulnerabilities in iOS apps. Zbl 1411.94058
D’Orazio, Christian J.; Lu, Rongxing; Choo, Kim-Kwang Raymond; Vasilakos, Athanasios V.
1
2017
A privacy-preserving outsourced functional computation framework across large-scale multiple encrypted domains. Zbl 1360.94320
Liu, Ximeng; Qin, Baodong; Deng, Robert H.; Lu, Rongxing; Ma, Jianfeng
1
2016
User collusion avoidance scheme for privacy-preserving decentralized key-policy attribute-based encryption. Zbl 1360.94329
Rahulamathavan, Yogachandran; Veluru, Suresh; Han, Jinguang; Li, Fei; Rajarajan, Muttukrishnan; Lu, Rongxing
1
2016
EFADS: efficient, flexible and anonymous data sharing protocol for cloud computing with proxy re-encryption. Zbl 1405.68023
Wei, Guiyi; Lu, Rongxing; Shao, Jun
1
2014
Designing efficient proxy signature schemes for mobile communication. Zbl 1137.94010
Lu, Rongxing; Dong, Xiaolei; Cao, Zhenfu
4
2008
New \((t, n)\) threshold directed signature scheme with provable security. Zbl 1134.94375
Lu, Rongxing; Lin, Xiaodong; Cao, Zhenfu; Shao, Jun; Liang, Xiaohui
2
2008
A simple deniable authentication protocol based on the Diffie-Hellman algorithm. Zbl 1158.68008
Lu, Rongxing; Lin, Xiaodong; Cao, Zhenfu; Qin, Liuquan; Liang, Xiaohui
1
2008
An improved deniable authentication protocol. Zbl 1129.94036
Shao, Jun; Cao, Zhenfu; Lu, Rongxing
1
2006
Designated verifier proxy signature scheme with message recovery. Zbl 1076.94032
Lu, Rongxing; Cao, Zhenfu
4
2005
Provably secure proxy-protected signature schemes based on factoring. Zbl 1072.94013
Zhou, Yuan; Cao, Zhenfu; Lu, Rongxing
4
2005
A new deniable authentication protocol from bilinear pairings. Zbl 1076.94031
Lu, Rongxing; Cao, Zhenfu
3
2005
Threshold undeniable signature scheme based on conic. Zbl 1074.94009
Lu, Rong Xing; Cao, Zhen Fu; Zhou, Yuan
3
2005
A robust \((k,n)+1\) threshold proxy signature scheme based on factoring. Zbl 1075.94010
Lu, Rongxing; Cao, Zhenfu; Zhu, Haojin
3
2005
Robust ID-based threshold signcryption scheme from pairings. Zbl 1091.94505
Duan, Shanshan; Cao, Zhenfu; Lu, Rongxing
2
2005
Proxy blind multi-signature scheme without a secure channel. Zbl 1072.94011
Lu, Rongxing; Cao, Zhenfu; Zhou, Yuan
2
2005
Efficient remote user authentication scheme using smart card. Zbl 1088.68597
Lu, Rongxing; Cao, Zhenfu
1
2005

Citations by Year