Chang-Ji Wang

According to our database1, Chang-Ji Wang authored at least 14 papers between 2007 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Bidirectional Hash Chain Based Key Pre-distribution for Wireless Sensor Networks.
Proceedings of the 8th International Conference on Automation, 2023

2021
Two-dimensional diagonal layer hash chain based key pre-distribution scheme.
J. Inf. Secur. Appl., 2021

2014
Insecurity of an Dynamic User Revocation and Key Refreshing for Attribute-Based Encryption Scheme.
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014

Pseudonym-Based Cryptography and Its Application in Vehicular Ad Hoc Networks.
Proceedings of the Ninth International Conference on Broadband and Wireless Computing, 2014

An Efficient Cloud-Based Personal Health Records System Using Attribute-Based Encryption and Anonymous Multi-receiver Identity-Based Encryption.
Proceedings of the 2014 Ninth International Conference on P2P, 2014

2013
Two Anonymous Cooperative Cache-Based Data Access Schemes in Mobile Ad Hoc Networks.
Int. J. Distributed Sens. Networks, 2013

Security Analysis of Gagne et al.'s Threshold Attribute-Based Signcryption Scheme.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Forgery Attack on Two ID-Based Proxy Signature Schemes from Bilinear Pairings.
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013

Design of an Instant Messaging System Using Identity Based Cryptosystems.
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013

Two Anonymous Cooperative Caching Schemes in Mobile Ad Hoc Networks.
Proceedings of the Eighth International Conference on P2P, 2013

2012
A Key-policy Attribute-based Encryption Scheme with Constant Size Ciphertext.
Proceedings of the Eighth International Conference on Computational Intelligence and Security, 2012

Fuzzy identity-based threshold signature scheme based on bilinear maps.
Proceedings of the 5th International Conference on BioMedical Engineering and Informatics, 2012

2009
A New Construction of Fuzzy Identity Based Signature Scheme.
J. Inform. and Commun. Convergence Engineering, 2009

2007
ID-Based Fair Off-Line Electronic Cash System with Multiple Banks.
J. Comput. Sci. Technol., 2007


  Loading...