Caifen Wang

Orcid: 0000-0003-0759-3251

According to our database1, Caifen Wang authored at least 50 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Heterogeneous Signcryption Scheme From PKI to IBC With Multi-Ciphertext Equality Test in Internet of Vehicles.
IEEE Internet Things J., April, 2024

Cryptanalysis and Improvement of a Blockchain-Based Certificateless Signature for IIoT Devices.
IEEE Trans. Ind. Informatics, February, 2024

2023
Attribute-Based Searchable Encryption in Edge Computing for Lightweight Devices.
IEEE Syst. J., September, 2023

An efficient and revocable attribute-based data sharing scheme with rich expression and escrow freedom.
Inf. Sci., May, 2023

Cryptanalysis of a Transaction Scheme With Certificateless Cryptographic Primitives for IoT-Based Mobile Payments.
IEEE Syst. J., March, 2023

Efficient heterogeneous signcryption scheme based on Edge Computing for Industrial Internet of Things.
J. Syst. Archit., March, 2023

Improved Security of a Pairing-Free Certificateless Aggregate Signature in Healthcare Wireless Medical Sensor Networks.
IEEE Internet Things J., 2023

2022
Specified keywords search scheme for EHR sharing.
Soft Comput., 2022

Blockchain-based multi-user certificateless encryption with keyword search for electronic health record sharing.
Peer-to-Peer Netw. Appl., 2022

A blockchain-based keyword search scheme with dual authorization for electronic health record sharing.
J. Inf. Secur. Appl., 2022

Privacy-Preserving Mutual Heterogeneous Signcryption Schemes Based on 5G Network Slicing.
IEEE Internet Things J., 2022

Security analysis and improvement of a privacy-preserving authentication scheme in VANET.
Int. J. Inf. Sec., 2022

Keyword search over encrypted cloud data based on blockchain in smart medical applications.
Comput. Commun., 2022

Broadcast signcryption scheme based on certificateless in wireless sensor network.
Comput. Networks, 2022

2021
Analysis of the Comments on "Identity-Based Distributed Provable Data Possession in Multicloud Storage".
IEEE Trans. Serv. Comput., 2021

Comments on "Attribute-Based Data Sharing Scheme Revisited in Cloud Computing".
IEEE Trans. Inf. Forensics Secur., 2021

A certificateless linearly homomorphic signature scheme for network coding and its application in the IoT.
Peer-to-Peer Netw. Appl., 2021

PSCPAC: Post-quantum secure certificateless public auditing scheme in cloud storage.
J. Inf. Secur. Appl., 2021

Efficient and anonymous multi-message and multi-receiver electronic health records sharing scheme without secure channel based on blockchain.
Trans. Emerg. Telecommun. Technol., 2021

2020
A Secure and Lightweight Fine-Grained Data Sharing Scheme for Mobile Cloud Computing.
Sensors, 2020

Deniably authenticated searchable encryption scheme based on Blockchain for medical image data sharing.
Multim. Tools Appl., 2020

Impersonation Attacks on Lightweight Anonymous Authenticated Key Exchange Scheme for IoT.
IACR Cryptol. ePrint Arch., 2020

VCLPKES: Verifiable Certificateless Public Key Searchable Encryption Scheme for Industrial Internet of Things.
IEEE Access, 2020

Stateless Cloud Auditing Scheme for Non-Manager Dynamic Group Data With Privacy Preservation.
IEEE Access, 2020

Privacy-Preserving Cloud Auditing for Multiple Users Scheme With Authorization and Traceability.
IEEE Access, 2020

Multi-Replica and Multi-Cloud Data Public Audit Scheme Based on Blockchain.
IEEE Access, 2020

A Blockchain-Assisted Verifiable Outsourced Attribute-Based Signcryption Scheme for EHRs Sharing in the Cloud.
IEEE Access, 2020

Medical Data Sharing Scheme Based on Attribute Cryptosystem and Blockchain Technology.
IEEE Access, 2020

Multi-Keyword Certificateless Searchable Public Key Authenticated Encryption Scheme Based on Blockchain.
IEEE Access, 2020

Leveled Adaptively Strong-Unforgeable Identity-Based Fully Homomorphic Signatures.
IEEE Access, 2020

Lattice-Based Privacy-Preserving and Forward-Secure Cloud Storage Public Auditing Scheme.
IEEE Access, 2020

2019
A Strongly Unforgeable Certificateless Signature Scheme and Its Application in IoT Environments.
Sensors, 2019

Designated Server Certificateless Deniably Authenticated Encryption With Keyword Search.
IEEE Access, 2019

A Privacy-Preserving RLWE-Based Remote Biometric Authentication Scheme for Single and Multi-Server Environments.
IEEE Access, 2019

Cryptanalysis and Improvement of a Remote Anonymous Authentication Protocol for Mobile Multi-server Environments.
Proceedings of the Fourth IEEE International Conference on Data Science in Cyberspace, 2019

2018
A Strong Designated Verifier Proxy Re-Signature Scheme for IoT Environments.
Symmetry, 2018

Security Analysis of a Revocable and Strongly Unforgeable Identity-Based Signature Scheme.
Inf. Technol. Control., 2018

A Novel Blockchain-Based Authenticated Key Exchange Protocol and Its Applications.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

2017
Multi-message and multi-receiver heterogeneous signcryption scheme for ad-hoc networks.
Inf. Secur. J. A Glob. Perspect., 2017

An authenticated key agreement protocol for cross-domain based on heterogeneous signcryption scheme.
Proceedings of the 13th International Wireless Communications and Mobile Computing Conference, 2017

Privacy-Preserving Multi-party Aggregate Signcryption for Heterogeneous Systems.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017

Cryptanalysis and Improvement of a Strongly Unforgeable Identity-Based Signature Scheme.
Proceedings of the Information Security and Cryptology - 13th International Conference, 2017

2016
Privacy-preserving multi-receiver signcryption scheme for heterogeneous systems.
Secur. Commun. Networks, 2016

2015
Strong Designated Verifier Signature Scheme Resisting Replay Attack.
Inf. Technol. Control., 2015

A new forward secure content extraction signature scheme.
Proceedings of the 12th International Conference on Fuzzy Systems and Knowledge Discovery, 2015

2013
An ID-Based Certified E-mail Protocol with STTP Suitable for Wireless Mobile Environments.
J. Comput., 2013

Lossy data aggregation integrity scheme in wireless sensor networks.
Comput. Electr. Eng., 2013

2011
An ID-Based Certified E-mail Protocol Suitable for Wireless Mobile Environments.
Proceedings of the Fourth International Symposium on Parallel Architectures, 2011

An Improved Signcryption with Proxy Re-encryption and its Application.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

2009
An Efficient Identity-Based Certified E-mail Protocol.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009


  Loading...