R. Chen, Y. Mu, G. Yang, F. Guo, M. Zhang. Cryptographic reverse firewall via malleable smooth projective hash functions. ASIACRYPT 2016, LNCS 10031, pp 844-876 (2016) (A类会议)
M. Zhang, Y. Zhang, Y. Jiang and J. Shen. Obfuscating eves algorithm and its application in fair electronic transactions in public cloud systems// IEEE System Journal, 13(2): 1478-1486 (2019) (SCI一区)
M. Zhang. Y. Yao, B. Li, C. Tang. Accountable mobile e-commerce scheme in intelligent cloud system transactions// Journal of Ambient Intelligence and Humanized Computing. 9(6):1889-1899 Springer (2018) (SCI)
M. Zhang, Y. Zhang, Y. Su, Q. Huang, Y. Mu. Attribute-based hash proof system under learning-with-errors assumption in obfuscator-free and leakage-resilient environments// IEEE System Journal, 11, 2: 1018-1026 (2017) (SCI一区)
M. Zhangand Y. Mu. Token-leakage tolerant and vector obfuscated IPE and application in privacy-preserving two-party point/polynomial evaluations// Computer Journal, 59(4): 493-507 (2016) (SCI,CCF-B)
M. Zhang, T. Takagi. Efficient construction of anonymous multireceiver encryption protocols and their deployment in group email systems with privacy preservation//IEEE System Journal, vol.7, no.3, pp.410-419 (2013) (SCI一区)
M. Zhang, B. Yang and T. Takagi. Bounded leakage-resilient functional encryption with hidden vector predicate//The Computer Journal, 2013, 56(4): 464-477 (2013) Oxford (SCI,CCF-B)
M. Zhang, B. Yang, Z. Chen, T.Takagi. Efficient and adaptively secure broadcast encryption systems//Security and Communication Networks, vol.6, no.8, pp.1044-1052 (2013) (SCI,CCF-C)
M. Zhang, F. Li, T. Takagi. Analysis and improvement of a secret broadcast with binding encryption in broadcasting networks//IEICE Transaction on Information System, Vol. E95-D, No.2, pp.686-689 (2012) (SCI)
M. Zhang, B. Yang, T. Takagi, Anonymous spatial encryption under affine space delegation functionality with full security//Information Sciences, 277, 715-730, (2014). Elsevier (SCI一区)
M. Zhang, B. Yang, T. Takagi. Group-oriented setting's multisigncryption scheme with threshold designcryption//Information Sciences, Elsevier, 181, 18: 4041-4050 (2011) (SCI一区)
M. Zhang, C.Wang, T.Takagi, and Y.Mu. Functional encryption resilient to hard-to-invert leakage//The Computer Journal, 58(4): 735-749 (2015) (SCI,CCF-B)
M. Zhang, C. Wang, B. Yang and T. Takagi. Fully secure constructions of spatial encryption with vector privacy//International Journal of Communication Systems, DOI: 10.1002/dac.2614 (2013)
M. Zhang, N. Takashi, B. Yang, T. Takagi. Anonymous encryption with partial order subset delegation and its application in privacy email system//IET Information Security, 8(4): 240-249. (SCI)
M. Zhang, C.Wang, K.Morozov. LR-FEAD: leakage-tolerating and attribute-hiding functional encryption mechanism with delegation in affine subspaces//Journal of Supercomputing, 70(3): 1405-1432 (2014). Springer (SCI,CCF-B)
X. Li, Y. Zhu, J. Wang, Z. Liu, Y. Liu,M. Zhang. On the soundness and security of privacy-preserving SVM for outsourcing data classification. IEEE Transactions on Dependable and Secure Computing, 15(5): 906-912, 2018 (SCI一区,CCF A)
H. Shen,M. Zhang*, J. Shen. Efficient Privacy-Preserving Cube-data Aggregation Scheme for Smart Grids// IEEE Transaction on Information Forensics and Security, 12(6):1369-1381 (2017) (SCI一区,CCF A)
Sha Ma, Qiong Huang,Mingwu Zhangand Bo Yang. Efficient public-key encryption with equality test supporting flexible authorization// IEEE Transaction on Information Forensics and Security. 10 (3): 458-470 (2015) (SCI一区,CCF A)
X.A. Wang, J. Ma, F. Xhafa,M. Zhang, X. Luo.Cost-effective secure E-health cloud system using identity based cryptographic techniques//Future Generation Computer Systems, 67: 242–254 (2017) (SCI一区)
金涛,林亚平,张明武,童调生. 一种基于决策图贝叶斯网络的强度Pareto进化算法// 计算机学报, 2005, 28(12): 1193-1199
张明武,杨波, 高木刚 .抗主密钥泄露和连续泄露的双态仿射函数加密//计算机学报,2012,35(9):1856-1867
张明武,杨波,姚金涛,张文政,标准模型下身份匿名签名方案分析与设计//通信学报, 2011.(3):40-46
张明武, 杨波 , 周敏, 张文政,两种签密方案的安全性分析改进// 电子与信息学报,2010 3,2(7):1731-1736
张明武,杨波,祝胜林,张文政. 保护协商证书隐私的策略签名方案//电子与信息学报,2009,32(1):224-227
戴永谦,张明武, 祝胜林, 朱同林,周权,戴永新. 一种节点自分布最优 Ad Hoc 多播树及应用// 电子学报, 43(7): 1449-1456
张明武, 王春枝, 杨波, 高木刚, 密钥弹性泄露安全的通配模板委托加密机制// 软件学报,26(5):1196-1212 , 2015
张明武, 杨波, 王春枝, Tsuyoshi Takagi, 隐私保护的推理机策略函数加密及应用// 计算机学报,38(4): 897-908, (2015)
张明武,陈泌文,何德彪,杨波. 高效弹性泄漏下CCA安全的公钥加密体制// 计算机学报,29(3):492-502 (2016)
张明武,沈华,穆怡.虚拟黑盒安全程序混淆:模型进展与挑战//计算机学报, 40(12): 2700-2717 (2017)
李素娟,张明武, 张福泰. 抗(持续)辅助输入CCA安全的PKE构造方案分析及改进//计算机学报,41 (12): 2823-2832 (2018)