default search action
Hongbo Li 0004
Person information
- affiliation: South China Agricultural University, College of Mathematics and Informatics, Guangzhou, China
Other persons with the same name
- Hongbo Li (aka: Hong-bo Li, Hong-Bo Li) — disambiguation page
- Hongbo Li 0001 — Tsinghua University, Department of Computer Science and Technology, Beijing, China
- Hongbo Li 0002 — Harbin Institute of Technology, School of Electronic and Information Engineering, China
- Hongbo Li 0003 — Shanghai Jiao Tong University, China (and 1 more)
- Hongbo Li 0005 — Northeast Normal University, School of Information Science and Technology, Changchun, China (and 1 more)
- Hongbo Li 0006 — University of California Riverside, Department of Computer Science and Engineering, Riverside, CA, USA
- Hongbo Li 0007 — Sun Yat-Sen University, School of Data and Computer Science, Guangzhou, China
- Hongbo Li 0008 — Singapore University of Technology and Design, Pillar of Engineering Systems and Design, Singapore
- Hongbo Li 0009 — Affiliated Hospital of Jianghan University, Wuhan Sixth Hospital, Department of Radiology, Wuhan, China
- Hongbo Li 0010 — Harbin Institute of Technology at Zhangjiakou, Electric Power Research Institute of HITZ, Zhangjiakou, China
- Hongbo Li 0011 — Northeast Forestry University, College of Mechanical and Electrical Engineering, Harbin, China
- Hongbo Li 0012 — Chinese Academy of Sciences, Academy of Mathematics and System Sciences, Mathematics Mechanization Key Lab, Beijing, China
- Hongbo Li 0013 — Shanghai University, School of Management, Shanghai, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j22]Kaifeng Xiao, Xinjian Chen, Jianye Huang, Hongbo Li, Qiong Huang:
A lattice-based public key encryption scheme with delegated equality test. Comput. Stand. Interfaces 87: 103758 (2024) - [j21]Jingwei Lu, Hongbo Li, Jianye Huang, Sha Ma, Man Ho Allen Au, Qiong Huang:
An Identity-Based Encryption with Equality Test scheme for healthcare social apps. Comput. Stand. Interfaces 87: 103759 (2024) - [j20]Shuaining Gao, Xinjian Chen, Hongbo Li, Willy Susilo, Qiong Huang:
Post-quantum secure group signature with verifier local revocation and backward unlinkability. Comput. Stand. Interfaces 88: 103782 (2024) - [j19]Kaifeng Xiao, Xinjian Chen, Hongbo Li, Jianye Huang, Willy Susilo, Qiong Huang:
A fully secure lattice-based signcryption with designated equality test in standard model. Inf. Sci. 658: 120015 (2024) - [j18]Zesheng Lin, Hongbo Li, Xinjian Chen, Meiyan Xiao, Qiong Huang:
Identity-Based Encryption With Disjunctive, Conjunctive and Range Keyword Search From Lattices. IEEE Trans. Inf. Forensics Secur. 19: 8644-8657 (2024) - 2023
- [j17]Xinmin Yang, Xinjian Chen, Jianye Huang, Hongbo Li, Qiong Huang:
FS-IBEKS: Forward secure identity-based encryption with keyword search from lattice. Comput. Stand. Interfaces 86: 103732 (2023) - [j16]Pan Yang, Hongbo Li, Jianye Huang, Hao Zhang, Man Ho Allen Au, Qiong Huang:
Secure channel free public key authenticated encryption with multi-keyword search on healthcare systems. Future Gener. Comput. Syst. 145: 511-520 (2023) - [j15]Jingwei Lu, Hongbo Li, Jianye Huang, Sha Ma, Man Ho Allen Au, Qiong Huang:
Certificateless Public Key Authenticated Encryption with Keyword Search Achieving Stronger Security. Inf. 14(3): 142 (2023) - [j14]Qiong Huang, Peisen Huang, Hongbo Li, Jianye Huang, Hongyuan Lin:
A more efficient public-key authenticated encryption scheme with keyword search. J. Syst. Archit. 137: 102839 (2023) - [j13]Hongbo Li, Qiong Huang, Jianye Huang, Willy Susilo:
Public-Key Authenticated Encryption With Keyword Search Supporting Constant Trapdoor Generation and Fast Search. IEEE Trans. Inf. Forensics Secur. 18: 396-410 (2023) - [c5]Guiquan Yang, Sha Ma, Hongbo Li, Husheng Yang, Qiong Huang:
Public Key Authenticated Encryption with Keyword Search Improved: Strong Security Model and Multi-keyword Construction. Inscrypt (1) 2023: 299-319 - 2022
- [j12]Xinjian Chen, Qiong Huang, Hongbo Li, Zhijian Liao, Willy Susilo:
A novel identity-based multi-signature scheme over NTRU lattices. Theor. Comput. Sci. 933: 163-176 (2022) - [j11]Hongbo Li, Qiong Huang, Willy Susilo:
A Secure Cloud Data Sharing Protocol for Enterprise Supporting Hierarchical Keyword Search. IEEE Trans. Dependable Secur. Comput. 19(3): 1532-1543 (2022) - [j10]Meiyan Xiao, Hongbo Li, Qiong Huang, Shui Yu, Willy Susilo:
Attribute-Based Hierarchical Access Control With Extendable Policy. IEEE Trans. Inf. Forensics Secur. 17: 1868-1883 (2022) - [c4]Pan Yang, Hongbo Li, Jianye Huang, Hao Zhang, Man Ho Au, Qiong Huang:
Secure-Channel Free Certificateless Searchable Public Key Authenticated Encryption with Keyword Search. ProvSec 2022: 20-35 - 2021
- [j9]Wenbo Liu, Qiong Huang, Xinjian Chen, Hongbo Li:
Efficient functional encryption for inner product with simulation-based security. Cybersecur. 4(1): 2 (2021) - [j8]Yuanhao Wang, Qiong Huang, Hongbo Li, Meiyan Xiao, Sha Ma, Willy Susilo:
Private Set Intersection With Authorization Over Outsourced Encrypted Datasets. IEEE Trans. Inf. Forensics Secur. 16: 4050-4062 (2021) - [c3]Yuanhao Wang, Qiong Huang, Hongbo Li, Meiyan Xiao, Jianye Huang, Guomin Yang:
Public Key Encryption with Fuzzy Matching. ProvSec 2021: 39-62 - 2020
- [j7]Yuanhao Wang, Yuzhao Cui, Qiong Huang, Hongbo Li, Jianye Huang, Guomin Yang:
Attribute-Based Equality Test Over Encrypted Data Without Random Oracles. IEEE Access 8: 32891-32903 (2020) - [j6]Ying Miao, Qiong Huang, Meiyan Xiao, Hongbo Li:
Decentralized and Privacy-Preserving Public Auditing for Cloud Storage Based on Blockchain. IEEE Access 8: 139813-139826 (2020)
2010 – 2019
- 2019
- [j5]Hongbo Li, Qiong Huang, Sha Ma, Jian Shen, Willy Susilo:
Authorized Equality Test on Identity-Based Ciphertexts for Secret Data Sharing via Cloud Storage. IEEE Access 7: 25409-25421 (2019) - [j4]Yuanhao Wang, Qiong Huang, Hongbo Li, Jianye Huang, Guomin Yang, Willy Susilo:
Public Key Authenticated Encryption With Designated Equality Test and its Applications in Diagnostic Related Groups. IEEE Access 7: 135999-136011 (2019) - [j3]Yuzhao Cui, Qiong Huang, Jianye Huang, Hongbo Li, Guomin Yang:
Ciphertext-Policy Attribute-Based Encrypted Data Equality Test and Classification. Comput. J. 62(8): 1166-1177 (2019) - [j2]Hongbo Li, Qiong Huang, Jian Shen, Guomin Yang, Willy Susilo:
Designated-server identity-based authenticated encryption with keyword search for encrypted emails. Inf. Sci. 481: 330-343 (2019) - [c2]Xueqiao Liu, Hongbo Li, Guomin Yang, Willy Susilo, Joseph Tonien, Qiong Huang:
Towards Enhanced Security for Certificateless Public-Key Authenticated Encryption with Keyword Search. ProvSec 2019: 113-129 - 2018
- [c1]Yuzhao Cui, Qiong Huang, Jianye Huang, Hongbo Li, Guomin Yang:
Outsourced Ciphertext-Policy Attribute-Based Encryption with Equality Test. Inscrypt 2018: 448-467 - [i2]Qiong Huang, Hongbo Li:
An Efficient Public-Key Searchable Encryption Scheme Secure against Inside Keyword Guessing Attacks. IACR Cryptol. ePrint Arch. 2018: 7 (2018) - [i1]Yuzhao Cui, Qiong Huang, Jianye Huang, Hongbo Li, Guomin Yang:
Ciphertext-Policy Attribute-Based Encrypted Data Equality Test and Classification. IACR Cryptol. ePrint Arch. 2018: 1058 (2018) - 2017
- [j1]Qiong Huang, Hongbo Li:
An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks. Inf. Sci. 403: 1-14 (2017)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 21:26 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint