Follow
Zhide Chen
Zhide Chen
Fujian Normal University;Fudan University
Verified email at fjnu.edu.cn
Title
Cited by
Cited by
Year
Multi-identity single-key decryption without random oracles
F Guo, Y Mu, Z Chen, L Xu
Information Security and Cryptology: Third SKLOIS Conference, Inscrypt 2007 …, 2008
1312008
Identity-based online/offline encryption
F Guo, Y Mu, Z Chen
Financial Cryptography and Data Security: 12th International Conference, FC …, 2008
1032008
Identity-based encryption: how to decrypt multiple ciphertexts using a single decryption key
F Guo, Y Mu, Z Chen
International Conference on Pairing-Based Cryptography, 392-406, 2007
912007
An implicit identity authentication system considering changes of gesture based on keystroke behaviors
J Wu, Z Chen
International Journal of Distributed Sensor Networks 11 (6), 470274, 2015
482015
Incentive mechanism for selfish nodes in wireless sensor networks based on evolutionary game
Z Chen, Y Qiu, J Liu, L Xu
Computers & Mathematics with Applications 62 (9), 3378-3388, 2011
472011
Distracted driving recognition method based on deep convolutional neural network
X Rao, F Lin, Z Chen, J Zhao
Journal of Ambient Intelligence and Humanized Computing 12 (1), 193-200, 2021
392021
Fault-tolerant algorithms for connectivity restoration in wireless sensor networks
Y Zeng, L Xu, Z Chen
Sensors 16 (1), 3, 2015
322015
Dynamics stability in wireless sensor networks active defense model
Z Chen, C Qiao, Y Qiu, L Xu, W Wu
Journal of Computer and System Sciences 80 (8), 1534-1548, 2014
302014
Active defense model of wireless sensor networks based on evolutionary game theory
Y Qiu, Z Chen, L Xu
2010 6th International Conference on Wireless Communications Networking and …, 2010
262010
Efficient batch verification of short signatures for a single-signer setting without random oracles
F Guo, Y Mu, Z Chen
Advances in Information and Computer Security: Third International Workshop …, 2008
162008
Secure anonymous routing in trust and clustered wireless ad hoc networks
S Chen, L Xu, Z Chen
2007 Second International Conference on Communications and Networking in …, 2007
152007
A cluster header election scheme based on auction mechanism for intrusion detection in MANET
Y Zeng, Z Chen, C Qiao, L Xu
2011 International Conference on Network Computing and Information Security …, 2011
122011
Human continuous activity recognition based on energy‐efficient schemes considering cloud security technology
Z Chen, J Wu, A Castiglione, W Wu
Security and Communication Networks 9 (16), 3585-3601, 2016
102016
A simple analysis of heat transfer near an oscillating interface
ZD Chen, JJJ Chen
Chemical engineering science 53 (5), 947-950, 1998
101998
On the Security of WAI Protocol in the Third Version of WAPI
ZH Tang, L Xu, Z Chen, F Guo
2008 International Conference on Intelligent Information Hiding and …, 2008
92008
Spread and control of mobile benign worm based on two-stage repairing mechanism
M Wang, Z Chen, L Xu, H Zhan
Journal of Applied Mathematics 2014, 2014
82014
Random access control for M2M in LTE system
Z Chen, Y Zeng
International Journal of Distributed Sensor Networks 9 (12), 313797, 2013
82013
Routing protocols based on double auction for ad hoc networks
Z Wu, Z Chen, L Xu, F Guo
2007 International Conference on Networking, Architecture, and Storage (NAS …, 2007
82007
Worm propagation model in mobile network
Z Chen, M Wang, L Xu, W Wu
Concurrency and Computation: Practice and Experience 28 (4), 1134-1144, 2016
72016
Analysis of two-worm interaction model in heterogeneous M2M network
J Ma, Z Chen, J Liu, R Zheng
Information 6 (4), 613-632, 2015
72015
The system can't perform the operation now. Try again later.
Articles 1–20