- Hui Zhao, Jonathan Z. Sun, Fengying Wang, Lei Zhao, Finite Equivalence of Multi-secret Sharing Based on Lagrange Interpolating Polynomial, Security and Network Communications, Vol. 6, No. 9, pp1169~1175 (2013)
- Xin-xin Fan, Ming-chu Li, Hui Zhao, Xiaodong Chen, Zhenzhou Guo, Dong Jiao, Weifeng Sun, cluster: a maximum flow-based trust mechanism in P2P file sharing networks, Security and Communication Networks, Vol. 6, No. 9, pp1126~1142 (2013)
- Feng-ying Wang, Xiu-mei Li Cai-hong Li, Hui Zhao, Research on provenance security of E-commerce information, Information Technology Journal, Vol. 12, No. 23, pp7568~7533 (2013)
- Feng-ying Wang, Cai-hong Li, Hui Zhao, Shu-shu Liu, A credible usage access control model in cloud computing, Information Technology Journal, Vol.12, No. 20, pp5553~5558 (2013)
- Hui Zhao, Ming-chu Li, Kouichi Sakurai, Yi-zhi Ren, A Finite Equivalence of Verifiable Multi-secret Sharing in the Applied Pi-calculus, International Journal of Computational Intelligence Systems, Vol. 5, No. 1, pp1~12 (2012)
- Zhonghai Zhou, Jian Yuan, Hui Zhao, Mechanized Analysis of Multi-secret Sharing Based on Lagrange Interpolating Polynomial in the Applied Pi-calculus, International Journal of Advancements in Computing Technology, Vol. 4, No. 4 , pp149~155 (2012)
- Hui Zhao, Ming-chu Li, A Formal Separation Method of Protocols to Eliminate Parallel Attacks in Virtual Organization, Security and Network Communications, Vol. 4, No. 12, pp1461~1468 (2011)
- Zhen-zhou Guo, Ming-chu Li, Hui Zhao, Attribute Based Encryption with Attribute-Sets and Multi-Authority, Journal of Chinese Computer System Vol. 32, No. 12, pp37~42 (2011)
- Hui Zhao, Fan-Jie Meng, Zhen-fang Song, Lei Zhao, Feng-ying Wang, Automatic Multiprotocol Counterexample Constructing in Virtual Organization International Journal of Advancements in Computing Technology, Vol.3, No.6 , pp1235~1241 (2011)
- Hui Zhao, Feng-ying Wang, Zhen-fang Song, Lei Zhao, Multi-protocol Counterexample Constructing in Virtual Organization, International Journal of Advancements in Computing Technology, Vol.3, No.8, pp1723~1729 (2011)
- Xinxin Fan, Ming-chu Li, Jian-hua Ma, Hui Zhao, Behavior-based reputation management in P2P file-sharing networks, Journal of Computer and System Sciences, Vol. 78, No. 6, pp1737~1750 (2012)
- Hui Zhao, Ming-chu Li, Kouichi Sakurai, Yi-zhi Ren, Mechanized Analysis of Verifiable Multi-secret Sharing in The Applied Pi-calculus, ICIC Express Letters, Vol. 4, No. 3, pp141~146 (2009)
- Hui Zhao, Mingchu-Li, Grid Security Requirement Analysis Model Based on Virtual Organization, Computer Engineering, Vol. 34, No. 24, pp175~179 (2008)
- Hui Zhao, Ming-chu Li, Zhi-hui Wang, New Formal Verification Method of Grid Security Protocols Based on Virtual Organization, Computer Engineering and Applications, Vol. 43, No. 24, pp117~122 (2007)
- Hui Zhao, Jonathan Z. Sun, A Finite Equivalence of Interactive Secret-sharing Schemes, Proc. of the 2014 International Symposium on Computer Engineering and Information Technology (ISCEIT), Taiyuan, China, pp887~893 (2014)
- Hui Zhao, Ming-chu Li, Kouichi Sakurai, Yi-zhi Ren, Mechanized Analysis of Verifiable Multi-secret Sharing in the Applied Pi-calculus, Proc. of Symposium on Cryptography and Information Security, Kagawa, Japan, 2010.
- Hui Zhao, Ming-chu Li, Kouichi Sakurai, Yi-zhi Ren, Verifiable Multi-secret Sharing in the Applied Pi Calculus, Proc. of Computer Security Symposium, Toyama, Japan, IPSJ Symposium Series, Vol. 2009, No. 11, pp855~860 (2009)