Computer security, Computer network, Encryption, Ciphertext and Attribute-based encryption are his primary areas of study. He has researched Computer security in several fields, including Overhead and Cloud computing security. The Node, Protocol and Authentication research Zhenfu Cao does as part of his general Computer network study is frequently linked to other disciplines of science, such as Smart grid, therefore creating a link between diverse domains of science.
Zhenfu Cao works mostly in the field of Encryption, limiting it down to topics relating to Server and, in certain cases, Scalability, Key encapsulation and Paillier cryptosystem. His Ciphertext study combines topics from a wide range of disciplines, such as Cryptographic primitive and Theoretical computer science. His Attribute-based encryption research is multidisciplinary, incorporating perspectives in Standard model and On-the-fly encryption.
His primary areas of study are Computer security, Encryption, Computer network, Public-key cryptography and Theoretical computer science. Zhenfu Cao interconnects Protocol and Digital signature in the investigation of issues within Computer security. His Encryption research includes elements of Overhead, Standard model and Access control.
Zhenfu Cao combines subjects such as Wireless ad hoc network and Information privacy with his study of Computer network. His Public-key cryptography research incorporates elements of Identity and Distributed computing. His Theoretical computer science research is multidisciplinary, incorporating elements of Random oracle and Hash function.
Zhenfu Cao mostly deals with Encryption, Computer security, Public-key cryptography, Computer network and Ciphertext. His Encryption research incorporates themes from Overhead, Server, Cryptography and Access control. He undertakes interdisciplinary study in the fields of Computer security and Traceability through his works.
His research integrates issues of Feature extraction and Theoretical computer science in his study of Public-key cryptography. His Computer network study incorporates themes from Mobile device and Social network. His Homomorphic encryption research is multidisciplinary, relying on both Discrete mathematics, Information privacy, Data mining and Authentication.
Zhenfu Cao mainly investigates Computer security, Encryption, Attribute-based encryption, Access control and Public-key cryptography. His study in Computer security is interdisciplinary in nature, drawing from both Protocol and Cloud computing security. To a larger extent, Zhenfu Cao studies Computer network with the aim of understanding Encryption.
His Attribute-based encryption research integrates issues from Routing, Cryptography, Keyword search, Information retrieval and Internet protocol suite. The various areas that Zhenfu Cao examines in his Access control study include Cloud storage, Scalability and Cryptographic primitive. The concepts of his Public-key cryptography study are interwoven with issues in Homomorphic encryption, Theoretical computer science and Authentication.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Security and privacy for storage and computation in cloud computing
Lifei Wei;Haojin Zhu;Zhenfu Cao;Xiaolei Dong.
Information Sciences (2014)
Security and Privacy for Cloud-Based IoT: Challenges
Jun Zhou;Zhenfu Cao;Xiaolei Dong;Athanasios V. Vasilakos.
IEEE Communications Magazine (2017)
CCA-Secure Proxy Re-encryption without Pairings
Jun Shao;Zhenfu Cao.
public key cryptography (2009)
Secure Threshold Multi Authority Attribute Based Encryption without a Central Authority
Huang Lin;Zhenfu Cao;Xiaohui Liang;Jun Shao.
international conference on cryptology in india (2008)
Attribute based proxy re-encryption with delegating capabilities
Xiaohui Liang;Zhenfu Cao;Huang Lin;Jun Shao.
computer and communications security (2009)
Simple three-party key exchange protocol
Rongxing Lu;Zhenfu Cao.
Computers & Security (2007)
White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Any Monotone Access Structures
Zhen Liu;Zhenfu Cao;D. S. Wong.
IEEE Transactions on Information Forensics and Security (2013)
A Probabilistic Misbehavior Detection Scheme toward Efficient Trust Establishment in Delay-Tolerant Networks
Haojin Zhu;Suguo Du;Zhaoyu Gao;Mianxiong Dong.
IEEE Transactions on Parallel and Distributed Systems (2014)
Proxy re-encryption with keyword search
Jun Shao;Zhenfu Cao;Xiaohui Liang;Huang Lin.
Information Sciences (2010)
White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Flexible Attributes
Jianting Ning;Xiaolei Dong;Zhenfu Cao;Lifei Wei.
IEEE Transactions on Information Forensics and Security (2015)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below:
University of New Brunswick
Shanghai Jiao Tong University
University of Guelph
University of Massachusetts Boston
The University of Texas at San Antonio
University of Waterloo
City University of Hong Kong
Luleå University of Technology
University of Waterloo
City University of Hong Kong
Virginia Tech
Chinese Academy of Sciences
Bielefeld University
Chinese Academy of Sciences
General Motors (United States)
Case Western Reserve University
University of Chicago
McGill University
University of Toronto
Universidade de São Paulo
Chinese Academy of Sciences
University of Tokyo
National Research Council (CNR)
Oregon Health & Science University
University of California, San Diego
National Bureau of Economic Research