cheng guo
TitleCited byYear
Chaotic maps-based password-authenticated key agreement using smart cards
C Guo, CC Chang
Communications in Nonlinear Science and Numerical Simulation 18 (6), 1433-1440, 2013
1182013
A hierarchical threshold secret image sharing
C Guo, CC Chang, C Qin
Pattern Recognition Letters 33 (1), 83-91, 2012
742012
Fine-grained database field search using attribute-based encryption for e-healthcare clouds
C Guo, R Zhuang, Y Jie, Y Ren, T Wu, KKR Choo
Journal of medical systems 40 (11), 235, 2016
572016
A multi-threshold secret image sharing scheme based on MSP
C Guo, CC Chang, C Qin
Pattern Recognition Letters 33 (12), 1594-1600, 2012
392012
A new data hiding scheme based on DNA sequence
C Guo, CC Chang, ZH Wang
Int. J. Innov. Comput. Inf. Control 8 (1), 139-149, 2012
312012
Chaotic maps-based mutual authentication and key agreement using smart cards for wireless communications
C Guo, CC Chang, CY Sun
Journal of Information Hiding and Multimedia Signal Processing 4 (2), 99-109, 2013
302013
An authenticated group key distribution protocol based on the generalized Chinese remainder theorem
C Guo, CC Chang
International Journal of Communication Systems 27 (1), 126-134, 2014
282014
Key-aggregate authentication cryptosystem for data sharing in dynamic cloud storage
C Guo, N Luo, MZA Bhuiyan, Y Jie, Y Chen, B Feng, M Alam
Future Generation Computer Systems 84, 190-199, 2018
222018
Dynamic multi-phrase ranked search over encrypted data with symmetric searchable encryption
C Guo, X Chen, Y Jie, F Zhangjie, M Li, B Feng
IEEE Transactions on Services Computing, 2017
212017
A construction for secret sharing scheme with general access structure
C Guo, CC Chang
Journal of Information Hiding and Multimedia Signal Processing 4 (1), 1-8, 2013
212013
An efficient protocol with bidirectional verification for storage security in cloud computing
B Feng, X Ma, C Guo, H Shi, Z Fu, T Qiu
IEEE Access 4, 7899-7911, 2016
182016
A multi-threshold secret image sharing scheme based on the generalized Chinese reminder theorem
C Guo, H Zhang, Q Song, M Li
Multimedia Tools and Applications 75 (18), 11577-11594, 2016
172016
A fault‐tolerant group key agreement protocol exploiting dynamic setting
ZY Cheng, Y Liu, CC Chang, C Guo
International Journal of Communication Systems 26 (2), 259-275, 2013
142013
A new prediction model of infectious diseases with vaccination strategies based on evolutionary game theory
Q Li, MC Li, L Lv, C Guo, K Lu
Chaos, Solitons & Fractals 104, 51-60, 2017
122017
A Novel (n, n) Secret Image Sharing Scheme Based on Sudoku
ZH Wang, C Guo, CC Chang
Journal of Electronic Science and Technology 11 (1), 44-50, 2013
112013
Grid resource allocation model based on incomplete information game
MC Li, L Xu, WF Sun, K Lu, C Guo
Ruanjian Xuebao/Journal of Software 23 (2), 428-438, 2012
102012
AD‐ASGKA–authenticated dynamic protocols for asymmetric group key agreement
M Li, X Xu, C Guo, X Tan
Security and Communication Networks 9 (11), 1340-1352, 2016
92016
A region-adaptive semi-fragile dual watermarking scheme
H Shi, M Li, C Guo, R Tan
Multimedia Tools and Applications 75 (1), 465-495, 2016
92016
LPSSE: lightweight phrase search with symmetric searchable encryption in cloud storage
M Li, W Jia, C Guo, W Sun, X Tan
2015 12th International Conference on Information Technology-New Generations …, 2015
92015
A novel (n, t, n) secret image sharing scheme without a trusted third party
C Guo, CC Chang, C Qin
Multimedia tools and applications 72 (3), 2195-2209, 2014
92014
The system can't perform the operation now. Try again later.
Articles 1–20