Chen Wang

Affiliations:
  • Nanjing University of Information Science and Technology, School of Computer and Software, China


According to our database1, Chen Wang authored at least 37 papers between 2014 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Edge-Assisted Hierarchical Batch Authentication Scheme for VANETs.
IEEE Trans. Veh. Technol., January, 2024

2023
Attribute-Based Secure Data Aggregation for Isolated IoT-Enabled Maritime Transportation Systems.
IEEE Trans. Intell. Transp. Syst., February, 2023

An effective revocable and traceable public auditing scheme for sensor-based urban cities.
J. King Saud Univ. Comput. Inf. Sci., 2023

Searchable and secure edge pre-cache scheme for intelligent 6G wireless systems.
Future Gener. Comput. Syst., 2023

2022
Trustworthiness Evaluation-Based Routing Protocol for Incompletely Predictable Vehicular Ad Hoc Networks.
IEEE Trans. Big Data, 2022

2021
B-TSCA: Blockchain Assisted Trustworthiness Scalable Computation for V2I Authentication in VANETs.
IEEE Trans. Emerg. Top. Comput., 2021

A Searchable and Verifiable Data Protection Scheme for Scholarly Big Data.
IEEE Trans. Emerg. Top. Comput., 2021

A Novel Lightweight Authentication Protocol for Emergency Vehicle Avoidance in VANETs.
IEEE Internet Things J., 2021

Ultra-reliable secure data aggregation scheme with low latency for isolated terminals in 5G and beyond defined STINs.
Comput. Stand. Interfaces, 2021

A Secure and Privacy-Preserving Data Transmission Scheme in the Healthcare Framework.
Proceedings of the Information Security Practice and Experience: 16th International Conference, 2021

2020
Content-Centric Group User Authentication for Secure Social Networks.
IEEE Trans. Emerg. Top. Comput., 2020

Secure real-time image protection scheme with near-duplicate detection in cloud computing.
J. Real Time Image Process., 2020

Logarithmic encryption scheme for cyber-physical systems employing Fibonacci Q-matrix.
Future Gener. Comput. Syst., 2020

Moving centroid based routing protocol for incompletely predictable cyber devices in Cyber-Physical-Social Distributed Systems.
Future Gener. Comput. Syst., 2020

Anonymous data collection scheme for cloud-aided mobile edge networks.
Digit. Commun. Networks, 2020

2019
CATE: Cloud-Aided Trustworthiness Evaluation Scheme for Incompletely Predictable Vehicular Ad Hoc Networks.
IEEE Trans. Veh. Technol., 2019

Intelligent agent-based region division scheme for mobile sensor networks.
Soft Comput., 2019

Lightweight authentication and matrix-based key agreement scheme for healthcare in fog computing.
Peer-to-Peer Netw. Appl., 2019

Neighborhood trustworthiness-based vehicle-to-vehicle authentication scheme for vehicular ad hoc networks.
Concurr. Comput. Pract. Exp., 2019

A Trustworthiness-Based Time-Efficient V2I Authentication Scheme for VANETs.
Proceedings of the Blockchain and Trustworthy Systems - First International Conference, 2019

2018
Identity-Based Fast Authentication Scheme for Smart Mobile Devices in Body Area Networks.
Wirel. Commun. Mob. Comput., 2018

Quantum Cryptography for the Future Internet and the Security Analysis.
Secur. Commun. Networks, 2018

A Novel Security Scheme Based on Instant Encrypted Transmission for Internet of Things.
Secur. Commun. Networks, 2018

Secure Emergent Data Protection Scheme for a Space-Terrestrial Integrated Network.
IEEE Netw., 2018

Secure data uploading scheme for a smart home system.
Inf. Sci., 2018

Lightweight and practical node clustering authentication protocol for hierarchical wireless sensor networks.
Int. J. Sens. Networks, 2018

Privacy-Preserving Data Outsourcing with Integrity Auditing for Lightweight Devices in Cloud Computing.
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018

2017
Organized topology based routing protocol in incompletely predictable ad-hoc networks.
Comput. Commun., 2017

An Efficient Centroid-Based Routing Protocol for Energy Management in WSN-Assisted IoT.
IEEE Access, 2017

S-SurF: An Enhanced Secure Bulk Data Dissemination in Wireless Sensor Networks.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

Enhanced Remote Password-Authenticated Key Agreement Based on Smart Card Supporting Password Changing.
Proceedings of the Information Security Practice and Experience, 2017

A Novel Clustering Solution for Wireless Sensor Networks.
Proceedings of the Green, Pervasive, and Cloud Computing - 12th International Conference, 2017

A Fibonacci Based Batch Auditing Protocol for Cloud Data.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

2016
Direction Density-Based Secure Routing Protocol for Healthcare Data in Incompletely Predictable Networks.
IEEE Access, 2016

Greedy Probability-Based Routing Protocol for Incompletely Predictable Vehicular Ad-hoc Network.
Proceedings of the Security, Privacy and Anonymity in Computation, Communication and Storage, 2016

A RFID Based Localization Algorithm for Wireless Sensor Networks.
Proceedings of the Cloud Computing and Security - Second International Conference, 2016

2014
Performance Comparison of Typical Routing Protocols in Ad-hoc Networks.
Proceedings of the Intelligent Systems and Applications, 2014


  Loading...