default search action
Zijian Bao
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j20]Yongxin Zhang, Jiacheng Yang, Hong Lei, Zijian Bao, Ning Lu, Wenbo Shi, Bangdao Chen:
PACTA: An IoT Data Privacy Regulation Compliance Scheme Using TEE and Blockchain. IEEE Internet Things J. 11(5): 8882-8893 (2024) - [j19]Yulin Liu, Debiao He, Zijian Bao, Min Luo, Cong Peng:
PEACS: A Privacy-Enhancing and Accountable Car Sharing System. IEEE Internet Things J. 11(9): 16422-16435 (2024) - [j18]Jiabin Bao, Min Luo, Yitao Chen, Cong Peng, Zijian Bao:
A Certificateless Anonymous Authentication Scheme for VANETs Based on Ring Signature. J. Circuits Syst. Comput. 33(3) (2024) - [j17]Yongxin Zhang, Jiacheng Yang, Hong Lei, Zijian Bao, Ning Lu, Wenbo Shi, Bangdao Chen:
Verifiable Random Function Schemes Based on SM2 Digital Signature Algorithm and its Applications for Committee Elections. IEEE Open J. Comput. Soc. 5: 480-490 (2024) - [j16]Zijian Bao, Debiao He, Huaqun Wang, Min Luo, Cong Peng:
BAP: A Blockchain-Assisted Privacy-Preserving Authentication Protocol With User-Controlled Data Linkability for VANETs. IEEE Trans. Intell. Veh. 9(2): 4206-4220 (2024) - 2023
- [j15]Yongxin Zhang, Zijian Bao, Qinghao Wang, Ning Lu, Wenbo Shi, Bangdao Chen, Hong Lei:
OWL: A data sharing scheme with controllable anonymity and integrity for group users. Comput. Commun. 209: 455-468 (2023) - [j14]Zijian Bao, Debiao He, Huaqun Wang, Min Luo, Cong Peng:
A Group Signature Scheme With Selective Linkability and Traceability for Blockchain-Based Data Sharing Systems in E-Health Services. IEEE Internet Things J. 10(23): 21115-21128 (2023) - [j13]Haoyang An, Debiao He, Zijian Bao, Cong Peng, Qin Liu:
An identity-based dynamic group signature scheme for reputation evaluation systems. J. Syst. Archit. 139: 102875 (2023) - [j12]Xinjie Zhu, Debiao He, Zijian Bao, Min Luo, Cong Peng:
An Efficient Decentralized Identity Management System Based on Range Proof for Social Networks. IEEE Open J. Comput. Soc. 4: 84-96 (2023) - [j11]Zijian Bao, Debiao He, Cong Peng, Min Luo, Kim-Kwang Raymond Choo:
An Identity-Based Adaptor Signature Scheme and its Applications in the Blockchain System. IEEE Open J. Comput. Soc. 4: 231-242 (2023) - [j10]Xinjie Zhu, Debiao He, Zijian Bao, Cong Peng, Min Luo:
Two-Party Adaptor Signature Scheme Based on IEEE P1363 Identity-Based Signature. IEEE Open J. Commun. Soc. 4: 2717-2728 (2023) - [j9]Zijian Bao, Debiao He, Wei Wei, Cong Peng, Xinyi Huang:
LedgerMaze: An Efficient Privacy-Preserving Noninteractive Zero-Knowledge Scheme Over Account-Model Blockchain. IEEE Trans. Computers 72(12): 3489-3502 (2023) - [j8]Zijian Bao, Debiao He, Muhammad Khurram Khan, Min Luo, Qi Xie:
PBidm: Privacy-Preserving Blockchain-Based Identity Management System for Industrial Internet of Things. IEEE Trans. Ind. Informatics 19(2): 1524-1534 (2023) - [j7]Yulin Liu, Debiao He, Zijian Bao, Huaqun Wang, Muhammad Khurram Khan, Kim-Kwang Raymond Choo:
An Efficient Multilayered Linkable Ring Signature Scheme With Logarithmic Size for Anonymous Payment in Vehicle-to-Grid Networks. IEEE Trans. Intell. Veh. 8(4): 2998-3011 (2023) - [c6]Wei Wei, Min Luo, Zijian Bao, Cong Peng, Debiao He:
Traceable Ring Signatures from Group Actions: Logarithmic, Flexible, and Quantum Resistant. SAC 2023: 169-188 - 2022
- [j6]Qinghao Wang, Yongxin Zhang, Zijian Bao, Wenbo Shi, Hong Lei, Han Liu, Bangdao Chen:
SorTEE: Service-Oriented Routing for Payment Channel Networks With Scalability and Privacy Protection. IEEE Trans. Netw. Serv. Manag. 19(4): 3764-3780 (2022) - [c5]Zijian Bao, Debiao He, Yulin Liu, Cong Peng, Qi Feng, Min Luo:
Quartet: A Logarithmic Size Linkable Ring Signature Scheme from DualRing. CSS 2022: 56-70 - 2021
- [j5]Zijian Bao, Min Luo, Huaqun Wang, Kim-Kwang Raymond Choo, Debiao He:
Blockchain-Based Secure Communication for Space Information Networks. IEEE Netw. 35(4): 50-57 (2021) - 2020
- [j4]Zijian Bao, Qinghao Wang, Wenbo Shi, Lei Wang, Hong Lei, Bangdao Chen:
When Blockchain Meets SGX: An Overview, Challenges, and Open Issues. IEEE Access 8: 170404-170420 (2020) - [j3]Kuan Fan, Zijian Bao, Mingxi Liu, Athanasios V. Vasilakos, Wenbo Shi:
Dredas: Decentralized, reliable and efficient remote outsourced data auditing scheme with blockchain smart contract for industrial IoT. Future Gener. Comput. Syst. 110: 665-674 (2020) - [j2]Zijian Bao, Wenbo Shi, Saru Kumari, Zhiyin Kong, Chien-Ming Chen:
Lockmix: a secure and privacy-preserving mix service for Bitcoin anonymity. Int. J. Inf. Sec. 19(3): 311-321 (2020) - [c4]Hong Lei, Zijian Bao, Qinghao Wang, Yongxin Zhang, Wenbo Shi:
SDABS: A Secure Cloud Data Auditing Scheme Based on Blockchain and SGX. BlockSys 2020: 269-281 - [c3]Hong Lei, Qinghao Wang, Wenbo Shi, Zijian Bao:
A Survey on the Application of SGX in Blockchain Area. BlockSys 2020: 633-647 - [c2]Hong Lei, Yun Yan, Zijian Bao, Qinghao Wang, Yongxin Zhang, Wenbo Shi:
SDSBT: A Secure Multi-party Data Sharing Platform Based on Blockchain and TEE. CSS 2020: 184-196
2010 – 2019
- 2018
- [c1]Zijian Bao, Bin Wang, Wenbo Shi:
A Privacy-Preserving, Decentralized and Functional Bitcoin E-Voting Protocol. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2018: 252-256 - [i3]Zijian Bao, Wenbo Shi, Debiao He, Kim-Kwang Raymond Choo:
IoTChain: A Three-Tier Blockchain-based IoT Security Architecture. CoRR abs/1806.02008 (2018) - [i2]Zijian Bao, Bin Wang, Wenbo Shi:
A privacy-preserving, decentralized and functional Bitcoin e-voting protocol. CoRR abs/1809.08362 (2018) - [i1]Zijian Bao, Bin Wang, Yongxin Zhang, Qinghao Wang, Wenbo Shi:
Lockcoin: a secure and privacy-preserving mix service for bitcoin anonymity. CoRR abs/1811.04349 (2018) - 2017
- [j1]Wenbo Shi, Zijian Bao, Jiaqi Wang, Ning Lu, Fang Zhu, Jian Shen:
A privacy-preserving degree-matching multi-attribute auction scheme in smart grid auction market. Pers. Ubiquitous Comput. 21(5): 779-789 (2017)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-25 22:45 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint