H-Index & Metrics Top Publications

H-Index & Metrics

Discipline name H-index Citations Publications World Ranking National Ranking
Computer Science H-index 56 Citations 10,042 329 World Ranking 2088 National Ranking 196

Overview

What is he best known for?

The fields of study he is best known for:

  • Computer network
  • Cryptography
  • Computer security

Computer security, Computer network, Encryption, Ciphertext and Attribute-based encryption are his primary areas of study. He has researched Computer security in several fields, including Overhead and Cloud computing security. The Node, Protocol and Authentication research Zhenfu Cao does as part of his general Computer network study is frequently linked to other disciplines of science, such as Smart grid, therefore creating a link between diverse domains of science.

Zhenfu Cao works mostly in the field of Encryption, limiting it down to topics relating to Server and, in certain cases, Scalability, Key encapsulation and Paillier cryptosystem. His Ciphertext study combines topics from a wide range of disciplines, such as Cryptographic primitive and Theoretical computer science. His Attribute-based encryption research is multidisciplinary, incorporating perspectives in Standard model and On-the-fly encryption.

His most cited work include:

  • Security and privacy for storage and computation in cloud computing (362 citations)
  • Security and Privacy for Cloud-Based IoT: Challenges (276 citations)
  • Attribute based proxy re-encryption with delegating capabilities (178 citations)

What are the main themes of his work throughout his whole career to date?

His primary areas of study are Computer security, Encryption, Computer network, Public-key cryptography and Theoretical computer science. Zhenfu Cao interconnects Protocol and Digital signature in the investigation of issues within Computer security. His Encryption research includes elements of Overhead, Standard model and Access control.

Zhenfu Cao combines subjects such as Wireless ad hoc network and Information privacy with his study of Computer network. His Public-key cryptography research incorporates elements of Identity and Distributed computing. His Theoretical computer science research is multidisciplinary, incorporating elements of Random oracle and Hash function.

He most often published in these fields:

  • Computer security (52.25%)
  • Encryption (30.50%)
  • Computer network (23.40%)

What were the highlights of his more recent work (between 2016-2021)?

  • Encryption (30.50%)
  • Computer security (52.25%)
  • Public-key cryptography (22.46%)

In recent papers he was focusing on the following fields of study:

Zhenfu Cao mostly deals with Encryption, Computer security, Public-key cryptography, Computer network and Ciphertext. His Encryption research incorporates themes from Overhead, Server, Cryptography and Access control. He undertakes interdisciplinary study in the fields of Computer security and Traceability through his works.

His research integrates issues of Feature extraction and Theoretical computer science in his study of Public-key cryptography. His Computer network study incorporates themes from Mobile device and Social network. His Homomorphic encryption research is multidisciplinary, relying on both Discrete mathematics, Information privacy, Data mining and Authentication.

Between 2016 and 2021, his most popular works were:

  • Security and Privacy for Cloud-Based IoT: Challenges (276 citations)
  • Auditable $\sigma $ -Time Outsourced Attribute-Based Encryption for Access Control in Cloud Computing (69 citations)
  • White-Box Traceable CP-ABE for Cloud Storage Service: How to Catch People Leaking Their Access Credentials Effectively (38 citations)

In his most recent research, the most cited papers focused on:

  • Computer network
  • The Internet
  • Cryptography

Zhenfu Cao mainly investigates Computer security, Encryption, Attribute-based encryption, Access control and Public-key cryptography. His study in Computer security is interdisciplinary in nature, drawing from both Protocol and Cloud computing security. To a larger extent, Zhenfu Cao studies Computer network with the aim of understanding Encryption.

His Attribute-based encryption research integrates issues from Routing, Cryptography, Keyword search, Information retrieval and Internet protocol suite. The various areas that Zhenfu Cao examines in his Access control study include Cloud storage, Scalability and Cryptographic primitive. The concepts of his Public-key cryptography study are interwoven with issues in Homomorphic encryption, Theoretical computer science and Authentication.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Top Publications

Security and privacy for storage and computation in cloud computing

Lifei Wei;Haojin Zhu;Zhenfu Cao;Xiaolei Dong.
Information Sciences (2014)

575 Citations

CCA-Secure Proxy Re-encryption without Pairings

Jun Shao;Zhenfu Cao.
public key cryptography (2009)

391 Citations

Security and Privacy for Cloud-Based IoT: Challenges

Jun Zhou;Zhenfu Cao;Xiaolei Dong;Athanasios V. Vasilakos.
IEEE Communications Magazine (2017)

371 Citations

Secure Threshold Multi Authority Attribute Based Encryption without a Central Authority

Huang Lin;Zhenfu Cao;Xiaohui Liang;Jun Shao.
international conference on cryptology in india (2008)

324 Citations

Attribute based proxy re-encryption with delegating capabilities

Xiaohui Liang;Zhenfu Cao;Huang Lin;Jun Shao.
computer and communications security (2009)

272 Citations

Simple three-party key exchange protocol

Rongxing Lu;Zhenfu Cao.
Computers & Security (2007)

217 Citations

A Probabilistic Misbehavior Detection Scheme toward Efficient Trust Establishment in Delay-Tolerant Networks

Haojin Zhu;Suguo Du;Zhaoyu Gao;Mianxiong Dong.
IEEE Transactions on Parallel and Distributed Systems (2014)

183 Citations

Provably secure and efficient bounded ciphertext policy attribute based encryption

Xiaohui Liang;Zhenfu Cao;Huang Lin;Dongsheng Xing.
computer and communications security (2009)

172 Citations

White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Any Monotone Access Structures

Zhen Liu;Zhenfu Cao;D. S. Wong.
IEEE Transactions on Information Forensics and Security (2013)

172 Citations

Survey of information security

ChangXiang Shen;HuangGuo Zhang;DengGuo Feng;ZhenFu Cao.
Science in China Series F: Information Sciences (2007)

163 Citations

Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking h-index is inferred from publications deemed to belong to the considered discipline.

If you think any of the details on this page are incorrect, let us know.

Contact us

Top Scientists Citing Zhenfu Cao

Willy Susilo

Willy Susilo

University of Wollongong

Publications: 60

Rongxing Lu

Rongxing Lu

University of New Brunswick

Publications: 58

Yi Mu

Yi Mu

Fujian Normal University

Publications: 53

Xiaodong Lin

Xiaodong Lin

University of Guelph

Publications: 46

Kim-Kwang Raymond Choo

Kim-Kwang Raymond Choo

The University of Texas at San Antonio

Publications: 46

Xuemin Shen

Xuemin Shen

University of Waterloo

Publications: 45

Jianfeng Ma

Jianfeng Ma

Xidian University

Publications: 43

Ximeng Liu

Ximeng Liu

Fuzhou University

Publications: 42

Cheng-Chi Lee

Cheng-Chi Lee

Fu Jen Catholic University

Publications: 38

Robert H. Deng

Robert H. Deng

Singapore Management University

Publications: 32

Xiaohui Liang

Xiaohui Liang

University of Massachusetts Boston

Publications: 29

Debiao He

Debiao He

Wuhan University

Publications: 24

Haojin Zhu

Haojin Zhu

Shanghai Jiao Tong University

Publications: 24

Jian Weng

Jian Weng

Jinan University

Publications: 24

Jin Li

Jin Li

Guangzhou University

Publications: 21

Something went wrong. Please try again later.