Branding/Logomark minus Citation Combined Shape Icon/Bookmark-empty Icon/Copy Icon/Collection Icon/Close Copy 7 no author result Created with Sketch. Icon/Back Created with Sketch. Match!
Kai Zhang
Shanghai University of Electric Power
11Publications
3H-index
21Citations
Publications 11
Newest
Published on Apr 1, 2019in The Computer Journal 0.98
Ming Zeng (ECNU: East China Normal University), Kai Zhang3
Estimated H-index: 3
(SUEP: Shanghai University of Electric Power)
+ 2 AuthorsJie Chen11
Estimated H-index: 11
(ECNU: East China Normal University)
Published on Jan 24, 2018in Fundamenta Informaticae 1.20
Lifei Wei9
Estimated H-index: 9
(College of Information Technology),
Kai Zhang3
Estimated H-index: 3
(ECNU: East China Normal University)
+ 1 AuthorsDongmei Huang1
Estimated H-index: 1
(College of Information Technology)
Published on Sep 14, 2017in Sensors 3.03
Lifei Wei9
Estimated H-index: 9
,
Lei Zhang2
Estimated H-index: 2
+ 3 AuthorsGuojian Wu1
Estimated H-index: 1
Data authenticated aggregation is always a significant issue for wireless sensor networks (WSNs). The marine sensors are deployed far away from the security monitoring. Secure data aggregation for marine WSNs has emerged and attracted the interest of researchers and engineers. A multi-signature enables the data aggregation through one signature to authenticate various signers on the acknowledgement of a message, which is quite fit for data authenticated aggregation marine WSNs. However, most of ...
Published on Jun 19, 2017
Kai Zhang3
Estimated H-index: 3
(ECNU: East China Normal University),
Lifei Wei1
Estimated H-index: 1
(Shanghai Ocean University)
+ 1 AuthorsHaifeng Qian8
Estimated H-index: 8
(ECNU: East China Normal University)
In the marine wireless sensor networks, marine sensors collect multidimensional data such as temperature, salinity, dissolved oxygen and chlorophyll concentration in the ocean using a single hardware unit for further statistical analysis. Once these data are collected, they will be sent to the satellites or vessels for scientific information processing purposes, e.g. computing the mean, the variance and making regression analysis. Verifiable computation (VC) always allows the computationally wea...
Published on May 1, 2017 in ICNSC (International Conference on Networking, Sensing and Control)
Lifei Wei9
Estimated H-index: 9
(College of Information Technology),
Lei Zhang2
Estimated H-index: 2
(College of Information Technology)
+ 1 AuthorsKai Zhang3
Estimated H-index: 3
(ECNU: East China Normal University)
Data aggregation is a significant issue for marine wireless sensor networks. However, marine sensors are always deployed far away from the security monitoring. Thus, the secure data aggregation for marine sensor networks emerges and attracts the researchers and engineers. Multi-signature enables the data aggregation with a single signature to authenticate the message under different signers. However, most of the previous multi-signature schemes rely on the technique of bilinear pairing involving...
Published on Jan 1, 2017in Wireless Communications and Mobile Computing 1.40
Kai Zhang3
Estimated H-index: 3
,
Lifei Wei1
Estimated H-index: 1
+ 1 AuthorsHaifeng Qian8
Estimated H-index: 8
Outsourcing computation with verifiability is a merging notion in cloud computing, which enables lightweight clients to outsource costly computation tasks to the cloud and efficiently check the correctness of the result in the end. This advanced notion is more important in marine mobile computing since the oceangoing vessels are usually constrained with less storage and computation resources. In such a scenario, vessels always firstly outsource data set and perform a function computing over them...
Published on Dec 1, 2016in Security and Communication Networks 1.38
Kai Zhang3
Estimated H-index: 3
(ECNU: East China Normal University),
Wen Chen1
Estimated H-index: 1
(ECNU: East China Normal University)
+ 2 AuthorsHaifeng Qian8
Estimated H-index: 8
(ECNU: East China Normal University)
Published on Nov 10, 2016in Security and Communication Networks 1.38
Lei Zhang2
Estimated H-index: 2
(Beijing University of Posts and Telecommunications),
Lifei Wei9
Estimated H-index: 9
(College of Information Technology)
+ 3 AuthorsKaoru Ota23
Estimated H-index: 23
(MuIT: Muroran Institute of Technology)
Because the technology of mobile cloud computing has brought several benefits to information world, many applications in mobile devices based on cloud have emerged and boomed in the last years. According to the storage limitation, data owners would like to upload and further share the data through the cloud. Because of the safety requirements, mobile data owners are requested to provide credentials such as authentication tags along with the data. However, it is impossible to require mobile data ...
Published on Jul 4, 2016 in ACISP (Australasian Conference on Information Security and Privacy)
Yujuan Sun1
Estimated H-index: 1
(ECNU: East China Normal University),
Yu Yu9
Estimated H-index: 9
(SJTU: Shanghai Jiao Tong University)
+ 3 AuthorsYuan Zhou5
Estimated H-index: 5
In a verifiable computation VC scheme, a client asks a server to perform some outsourced computations, and the latter returns the results as its response. The results can be verified privately or publicly. Fiore and Gennaro CCS 2012 constructed publicly verifiable protocols for secure outsourcing polynomials and matrix computations. Batch verifiable computation BVC schemes allow a client to outsource multiple functions on a same input, and thus much reduce the storage overhead at the server side...
Published on May 30, 2016 in CCS (Computer and Communications Security)
Kai Zhang3
Estimated H-index: 3
(ECNU: East China Normal University),
Junqing Gong6
Estimated H-index: 6
(SJTU: Shanghai Jiao Tong University)
+ 4 AuthorsZhenfu Cao38
Estimated H-index: 38
(ECNU: East China Normal University)
In cloud computing, computationally weak users are always willing to outsource costly computations to a cloud, and at the same time they need to check the correctness of the result provided by the cloud. Such activities motivate the occurrence of verifiable computation (VC). Recently, Parno, Raykova and Vaikuntanathan showed any VC protocol can be constructed from an attribute-based encryption (ABE) scheme for a same class of functions. In this paper, we propose two practical and efficient semi-...
12