What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Fenghua Li
Google Scholar
15
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/compsec
An on-the-fly framework for usable access control policy mining.
Yunchuan Guo
Xiao Wang
Mingjie Yu
Fenghua Li
Zhen Pang
Liang Fang
2025
journals/tifs
Beyond Access Pattern: Efficient Volume-Hiding Multi-Range Queries Over Outsourced Data Services.
Haoyang Wang
Kai Fan
Chong Yu
Kuan Zhang
Fenghua Li
Haojin Zhu
2025
journals/tifs
Hide Yourself: Multi-Dimensional Range Queries for Responses-Hiding Over Outsourced Data.
Haoyang Wang
Kai Fan
Chong Yu
Kuan Zhang
Fenghua Li
Haojin Zhu
2025
journals/compsec
OPMonitor: Continuously monitoring residual over-granted permissions in verified access control policies.
Xiao Wang
Yunchuan Guo
Zhe Sun
Mingjie Yu
Fenghua Li
Liang Fang
2025
conf/icics
Circulation Control Model and Administration for Geospatial Data.
Heng Li
Fenghua Li
Yunchuan Guo
Lingcui Zhang
Xiao Wang
Ziyan Zhou
2024
journals/tifs
IMap: Toward a Fast, Scalable and Reconfigurable In-Network Scanner With Programmable Switches.
Menghao Zhang
Guanyu Li
Cheng Guo
Han Bao
Mingwei Xu
Hongxin Hu
Fenghua Li
2023
conf/icics
On-Demand Allocation of Cryptographic Computing Resource with Load Prediction.
Xiaogang Cao
Fenghua Li
Kui Geng
Yingke Xie
Wenlong Kou
2023
conf/icics
A Certificateless Conditional Anonymous Authentication Scheme for Satellite Internet of Things.
Minqiu Tian
Fenghua Li
Kui Geng
Wenlong Kou
Chao Guo
2021
journals/tifs
Smart and Practical Privacy-Preserving Data Aggregation for Fog-Based Smart Grids.
Shuai Zhao
Fenghua Li
Hongwei Li
Rongxing Lu
Siqi Ren
Haiyong Bao
Jianhong Lin
Song Han
2020
journals/compsec
Dynamic countermeasures selection for multi-path attacks.
Fenghua Li
Yongjun Li
Siyuan Leng
Yunchuan Guo
Kui Geng
Zhen Wang
Liang Fang
2020
conf/cns
Membership Inference Attacks against MemGuard : IEEE CNS 20 Poster.
Ben Niu
Yahong Chen
Likun Zhang
Fenghua Li
2019
journals/tifs
AnFRA: Anonymous and Fast Roaming Authentication for Space Information Network.
Qingyou Yang
Kaiping Xue
Jie Xu
Jiajie Wang
Fenghua Li
Nenghai Yu
2013
journals/tifs
Fast Estimation of Optimal Marked-Signal Distribution for Reversible Data Hiding.
Xiaocheng Hu
Weiming Zhang
Xuexian Hu
Nenghai Yu
Xianfeng Zhao
Fenghua Li
2013
journals/tifs
Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption.
Kede Ma
Weiming Zhang
Xianfeng Zhao
Nenghai Yu
Fenghua Li
2013
conf/cns
Certificateless public auditing for data integrity in the cloud.
Boyang Wang
Baochun Li
Hui Li
Fenghua Li
Coauthors
Baochun Li
(1)
Ben Niu
(1)
Boyang Wang
(1)
Chao Guo
(1)
Cheng Guo
(1)
Chong Yu
(2)
Fenghua Li
(15)
Guanyu Li
(1)
Haiyong Bao
(1)
Han Bao
(1)
Haojin Zhu
(2)
Haoyang Wang
(2)
Heng Li
(1)
Hongwei Li
(1)
Hongxin Hu
(1)
Hui Li
(1)
Jiajie Wang
(1)
Jianhong Lin
(1)
Jie Xu
(1)
Kai Fan
(2)
Kaiping Xue
(1)
Kede Ma
(1)
Kuan Zhang
(2)
Kui Geng
(3)
Liang Fang
(3)
Likun Zhang
(1)
Lingcui Zhang
(1)
Menghao Zhang
(1)
Mingjie Yu
(2)
Mingwei Xu
(1)
Minqiu Tian
(1)
Nenghai Yu
(3)
Qingyou Yang
(1)
Rongxing Lu
(1)
Shuai Zhao
(1)
Siqi Ren
(1)
Siyuan Leng
(1)
Song Han
(1)
Weiming Zhang
(2)
Wenlong Kou
(2)
Xianfeng Zhao
(2)
Xiao Wang
(3)
Xiaocheng Hu
(1)
Xiaogang Cao
(1)
Xuexian Hu
(1)
Yahong Chen
(1)
Yingke Xie
(1)
Yongjun Li
(1)
Yunchuan Guo
(4)
Zhe Sun
(1)
Zhen Pang
(1)
Zhen Wang
(1)
Ziyan Zhou
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to