Computer security, Computer network, Encryption, Ciphertext and Attribute-based encryption are his primary areas of study. He has researched Computer security in several fields, including Overhead and Cloud computing security. The Node, Protocol and Authentication research Zhenfu Cao does as part of his general Computer network study is frequently linked to other disciplines of science, such as Smart grid, therefore creating a link between diverse domains of science.
Zhenfu Cao works mostly in the field of Encryption, limiting it down to topics relating to Server and, in certain cases, Scalability, Key encapsulation and Paillier cryptosystem. His Ciphertext study combines topics from a wide range of disciplines, such as Cryptographic primitive and Theoretical computer science. His Attribute-based encryption research is multidisciplinary, incorporating perspectives in Standard model and On-the-fly encryption.
His primary areas of study are Computer security, Encryption, Computer network, Public-key cryptography and Theoretical computer science. Zhenfu Cao interconnects Protocol and Digital signature in the investigation of issues within Computer security. His Encryption research includes elements of Overhead, Standard model and Access control.
Zhenfu Cao combines subjects such as Wireless ad hoc network and Information privacy with his study of Computer network. His Public-key cryptography research incorporates elements of Identity and Distributed computing. His Theoretical computer science research is multidisciplinary, incorporating elements of Random oracle and Hash function.
Zhenfu Cao mostly deals with Encryption, Computer security, Public-key cryptography, Computer network and Ciphertext. His Encryption research incorporates themes from Overhead, Server, Cryptography and Access control. He undertakes interdisciplinary study in the fields of Computer security and Traceability through his works.
His research integrates issues of Feature extraction and Theoretical computer science in his study of Public-key cryptography. His Computer network study incorporates themes from Mobile device and Social network. His Homomorphic encryption research is multidisciplinary, relying on both Discrete mathematics, Information privacy, Data mining and Authentication.
Zhenfu Cao mainly investigates Computer security, Encryption, Attribute-based encryption, Access control and Public-key cryptography. His study in Computer security is interdisciplinary in nature, drawing from both Protocol and Cloud computing security. To a larger extent, Zhenfu Cao studies Computer network with the aim of understanding Encryption.
His Attribute-based encryption research integrates issues from Routing, Cryptography, Keyword search, Information retrieval and Internet protocol suite. The various areas that Zhenfu Cao examines in his Access control study include Cloud storage, Scalability and Cryptographic primitive. The concepts of his Public-key cryptography study are interwoven with issues in Homomorphic encryption, Theoretical computer science and Authentication.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Security and privacy for storage and computation in cloud computing
Lifei Wei;Haojin Zhu;Zhenfu Cao;Xiaolei Dong.
Information Sciences (2014)
CCA-Secure Proxy Re-encryption without Pairings
Jun Shao;Zhenfu Cao.
public key cryptography (2009)
Security and Privacy for Cloud-Based IoT: Challenges
Jun Zhou;Zhenfu Cao;Xiaolei Dong;Athanasios V. Vasilakos.
IEEE Communications Magazine (2017)
Secure Threshold Multi Authority Attribute Based Encryption without a Central Authority
Huang Lin;Zhenfu Cao;Xiaohui Liang;Jun Shao.
international conference on cryptology in india (2008)
Attribute based proxy re-encryption with delegating capabilities
Xiaohui Liang;Zhenfu Cao;Huang Lin;Jun Shao.
computer and communications security (2009)
Simple three-party key exchange protocol
Rongxing Lu;Zhenfu Cao.
Computers & Security (2007)
A Probabilistic Misbehavior Detection Scheme toward Efficient Trust Establishment in Delay-Tolerant Networks
Haojin Zhu;Suguo Du;Zhaoyu Gao;Mianxiong Dong.
IEEE Transactions on Parallel and Distributed Systems (2014)
Provably secure and efficient bounded ciphertext policy attribute based encryption
Xiaohui Liang;Zhenfu Cao;Huang Lin;Dongsheng Xing.
computer and communications security (2009)
White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Any Monotone Access Structures
Zhen Liu;Zhenfu Cao;D. S. Wong.
IEEE Transactions on Information Forensics and Security (2013)
Survey of information security
ChangXiang Shen;HuangGuo Zhang;DengGuo Feng;ZhenFu Cao.
Science in China Series F: Information Sciences (2007)
Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking h-index is inferred from publications deemed to belong to the considered discipline.
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below: