Changji Wang

Orcid: 0000-0003-2988-4404

According to our database1, Changji Wang authored at least 32 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Online/offline remote data auditing with strong key-exposure resilience for cloud storage.
Comput. Stand. Interfaces, March, 2024

2023
A Revocable Outsourced Data Accessing Control Scheme with Black-Box Traceability.
Proceedings of the Information Security Practice and Experience, 2023

2017
Group Rekeying in the Exclusive Subset-Cover Framework.
Theor. Comput. Sci., 2017

A New Privacy-Preserving Handover Authentication Scheme for Wireless Networks.
Sensors, 2017

Cloud-aided scalable revocable identity-based encryption scheme with ciphertext update.
Concurr. Comput. Pract. Exp., 2017

Privacy-Preserving Handover Authentication Protocol from Lightweight Identity-Based Signature for Wireless Networks.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

Insecurity of Cheng et al.'s Efficient Revocation in Ciphertext-Policy Attribute-Based Encryption Based Cryptographic Cloud Storage.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

P3ASC: Privacy-Preserving Pseudonym and Attribute-Based Signcryption Scheme for Cloud-Based Mobile Healthcare System.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

2016
An anonymous data access scheme for VANET using pseudonym-based cryptography.
J. Ambient Intell. Humaniz. Comput., 2016

An Asymmetric Signcryption Scheme for Cloud-Assisted Wireless Body Area Network.
Proceedings of the Security, Privacy and Anonymity in Computation, Communication and Storage, 2016

Fully Secure Unbounded Revocable Key-Policy Attribute-Based Encryption Scheme.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2016

An Efficient Adaptive-ID Secure Revocable Hierarchical Identity-Based Encryption Scheme.
Proceedings of the Smart Computing and Communication, 2016

2015
Privacy-preserving Cloud-based Personal Health Record System Using Attribute-based Encryption and Anonymous Multi-ReceiverIdentity-based Encryption.
Informatica (Slovenia), 2015

Attribute-Based Ring Signcryption Scheme and Its Application in Wireless Body Area Networks.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

2014
Integrating Ciphertext-Policy Attribute-Based Encryption with Identity-Based Ring Signature to Enhance Security and Privacy in Wireless Body Area Networks.
Proceedings of the Information Security and Cryptology - 10th International Conference, 2014

An Efficient Fuzzy Identity-Based Signature Scheme without Bilinear Pairings.
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014

2013
Efficient arbitrated quantum signature and its proof of security.
Quantum Inf. Process., 2013

Design and implementation of a secure cloud-based personal health record system using ciphertext-policy attribute-based encryption.
Int. J. Intell. Inf. Database Syst., 2013

An efficient attribute-based signature scheme with claim-predicate mechanism.
Int. J. Grid Util. Comput., 2013

A Ciphertext-Policy Attribute-Based Encryption Scheme Supporting Keyword Search Function.
Proceedings of the Cyberspace Safety and Security - 5th International Symposium, 2013

2012
A provable secure fuzzy identity based signature scheme.
Sci. China Inf. Sci., 2012

Implementing a Personal Health Record Cloud Platform Using Ciphertext-Policy Attribute-Based Encryption.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

2011
Exclusive Key-Based Group Rekeying.
IACR Cryptol. ePrint Arch., 2011

Attribute-based Signcryption with Ciphertext-policy and Claim-predicate Mechanism.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

2009
An Efficient Certificateless Signature from Pairings.
Int. J. Netw. Secur., 2009

2008
An ID-based Transferable Off-line E-Cash System with Revokable Anonymity.
Proceedings of The International Symposium on Electronic Commerce and Security, 2008

A Certificateless Restrictive Partially Blind Signature Scheme.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

Secure Relativistic Bit Commitment with Fixed Channel Capacity.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

2007
Cryptanalysis and Improvement of a Certificateless Proxy Signature Scheme from Bilinear Pairings.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

On the Security of an Identity-Based Threshold Proxy Signature Scheme with Known Signers.
Proceedings of the Third International Conference on Natural Computation, 2007

A Fair and Transferable Off-line Electronic Cash System with Multiple Banks.
Proceedings of ICEBE 2007, 2007

2005
Modeling and Analysis of Worm and Killer-Worm Propagation Using the Divide-and-Conquer Strategy.
Proceedings of the Distributed and Parallel Computing, 2005


  Loading...