Tao Zhang (张涛)
Tao Zhang (张涛)
Verified email at xidian.edu.cn
Cited by
Cited by
Personal health records integrity verification using attribute based proxy signature in cloud computing
X Liu, J Ma, J Xiong, T Zhang, Q Li
International Conference on Internet and Distributed Computing Systems, 238-251, 2013
Microthings: A generic iot architecture for flexible data aggregation and scalable service cooperation
Y Shen, T Zhang, Y Wang, H Wang, X Jiang
IEEE Communications Magazine 55 (9), 86-93, 2017
Ciphertext policy weighted attribute based encryption scheme
X Liu, J Ma, J Xiong, Q Li, T Zhang
Journal of Xi'an Jiaotong University 47 (8), 44-48, 2013
A situational awareness trust evolution model for mobile devices in D2D communication
J Guo, J Ma, X Li, T Zhang, Z Liu
IEEE Access 6, 4375-4386, 2017
Service composition in multi-domain environment under time constraint
T Zhang, J Ma, C Sun, Q Li, N Xi
2013 IEEE 20th International Conference on Web Services, 227-234, 2013
Threshold attribute-based encryption with attribute hierarchy for lattices in the standard model
X Liu, J Ma, J Xiong, Q Li, T Zhang, H Zhu
IET Information Security 8 (4), 217-223, 2014
An Attribute-Based Trust Negotiation Protocol for D2D Communication in Smart City Balancing Trust and Privacy.
J Guo, J Ma, X Li, J Zhang, T Zhang
J. Inf. Sci. Eng. 33 (4), 1007-1023, 2017
Trust-based service composition in multi-domain environments under time constraint
T Zhang, JF Ma, Q Li, N Xi, C Sun
Science China Information Sciences 57 (9), 1-16, 2014
PRAM: privacy preserving access management scheme in cloud services
J Xiong, Z Yao, J Ma, X Liu, Q Li, T Zhang
Proceedings of the 2013 international workshop on Security in cloud …, 2013
Trustworthy service composition with secure data transmission in sensor networks
T Zhang, L Zheng, Y Wang, Y Shen, N Xi, J Ma, J Yong
World Wide Web 21 (1), 185-200, 2018
Decentralized information flow verification framework for the service chain composition in mobile computing environments
N Xi, J Ma, C Sun, T Zhang
2013 IEEE 20th International Conference on Web Services, 563-570, 2013
刘西蒙, 马建峰, 熊金波, 李琦, 张涛
西安交通大学学报 47 (8), 44-48, 2013
Traceable ciphertext-policy attribute-based encryption with verifiable outsourced decryption in eHealth cloud
Q Li, H Zhu, Z Ying, T Zhang
Wireless Communications and Mobile Computing 2018, 2018
Distributed information flow verification framework for the composition of service chain in wireless sensor network
N Xi, J Ma, C Sun, Y Shen, T Zhang
International Journal of Distributed Sensor Networks 9 (5), 693639, 2013
Trustworthy service composition in service-oriented mobile social networks
T Zhang, J Ma, N Xi, X Liu, Z Liu, J Xiong
2014 ieee international conference on web services, 684-687, 2014
Fully secure decentralized key-policy attribute-based encryption
Q Li, J Ma, J Xiong, T Zhang, X Liu
2013 5th International Conference on Intelligent Networking and …, 2013
马骏, 郭渊博, 马建峰, 熊金波, 张涛
计算机研究与发展 50 (6), 1267-1275, 2013
Microthingschain: Edge computing and decentralized iot architecture based on blockchain for cross-domain data shareing
J Zheng, X Dong, T Zhang, J Chen, W Tong, X Yang
2018 International Conference on Networking and Network Applications (NaNA …, 2018
Trust-based service composition and selection in service oriented architecture
JJ Guo, JF Ma, XX Guo, XH Li, JW Zhang, T Zhang
Peer-to-Peer Networking and Applications 11 (5), 862-880, 2018
张涛, 马建峰, 习宁, 刘西蒙, 熊金波
电子学报 44 (2), 258-267, 2016
The system can't perform the operation now. Try again later.
Articles 1–20