Chenyu Wang
Orcid: 0000-0002-6527-2897Affiliations:
- Beijing University of Posts and Telecommunications (BUPT), School of Cyberspace Security, Beijing, China
According to our database1,
Chenyu Wang
authored at least 30 papers
between 2017 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
PUF-Based Lightweight Group Authentication for Massive IoT Access With Insecure Channel.
IEEE Internet Things J., July, 2025
Blockchain Heterogeneous Network Authentication Scheme Based on Batch Verification Group Signature.
IEEE Internet Things J., June, 2025
2024
A Physician's Privacy-Preserving Authentication and Key Agreement Protocol Based on Decentralized Identity for Medical Data Sharing in IoMT.
IEEE Internet Things J., September, 2024
IEEE Internet Things J., May, 2024
Cooperative Authentication Scheme for Heterogeneous Networks Based on Identity Group Signature and Blockchain.
IEEE Trans. Veh. Technol., January, 2024
Comput. Commun., 2024
2023
Anonymous Authentication Protocol Based on Physical Unclonable Function and Elliptic Curve Cryptography for Smart Grid.
IEEE Syst. J., December, 2023
Efficient ECC-Based Conditional Privacy-Preserving Aggregation Signature Scheme in V2V.
IEEE Trans. Veh. Technol., November, 2023
A Rivest-Shamir-Adleman-Based Robust and Effective Three-Factor User Authentication Protocol for Healthcare Use in Wireless Body Area Networks.
Sensors, November, 2023
Deep Reinforcement Learning-Based Intelligent Security Forwarding Strategy for VANET.
Sensors, February, 2023
Secure and Lightweight User Authentication Scheme for Cloud-Assisted Internet of Things.
IEEE Trans. Inf. Forensics Secur., 2023
Proceedings of the 48th IEEE Conference on Local Computer Networks, 2023
Research on Cryptographic Misuse Detection for Android Applications Based on Dynamic and Static Combination.
Proceedings of the 2023 International Conference on Advances in Artificial Intelligence and Applications, 2023
2022
Understanding Node Capture Attacks in User Authentication Schemes for Wireless Sensor Networks.
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Syst. J., 2022
Bit-Level Automotive Controller Area Network Message Reverse Framework Based on Linear Regression.
Sensors, 2022
J. Inf. Secur. Appl., 2022
A new efficient hierarchical multi-secret sharing scheme based on linear homogeneous recurrence relations.
Inf. Sci., 2022
Efficient privacy-preserving user authentication scheme with forward secrecy for industry 4.0.
Sci. China Inf. Sci., 2022
Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2022
2020
Security Analysis on "Anonymous Authentication Scheme for Smart Home Environment with Provable Security".
Wirel. Commun. Mob. Comput., 2020
Efficient Multi-Factor User Authentication Protocol with Forward Secrecy for Real-Time Data Access in WSNs.
ACM Trans. Cyber Phys. Syst., 2020
2019
A Provably Secure Biometrics-Based Authentication Scheme for Multiserver Environment.
Secur. Commun. Networks, 2019
Cloud-Aided Privacy Preserving User Authentication and Key Agreement Protocol for Internet of Things.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2019
2018
An Enhanced User Authentication Protocol Based on Elliptic Curve Cryptosystem in Cloud Computing Environment.
Wirel. Commun. Mob. Comput., 2018
A Secure and Anonymous Two-Factor Authentication Protocol in Multiserver Environment.
Secur. Commun. Networks, 2018
Fundam. Informaticae, 2018
2017
An Enhanced Three-Factor User Authentication Scheme Using Elliptic Curve Cryptosystem for Wireless Sensor Networks.
Sensors, 2017
Cryptanalysis of Three Password-Based Remote User Authentication Schemes with Non-Tamper-Resistant Smart Card.
Secur. Commun. Networks, 2017
Int. J. Commun. Syst., 2017