Chenyu Wang

Orcid: 0000-0002-6527-2897

Affiliations:
  • Beijing University of Posts and Telecommunications (BUPT), School of Cyberspace Security, Beijing, China


According to our database1, Chenyu Wang authored at least 30 papers between 2017 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
PUF-Based Lightweight Group Authentication for Massive IoT Access With Insecure Channel.
IEEE Internet Things J., July, 2025

Blockchain Heterogeneous Network Authentication Scheme Based on Batch Verification Group Signature.
IEEE Internet Things J., June, 2025

2024
A Physician's Privacy-Preserving Authentication and Key Agreement Protocol Based on Decentralized Identity for Medical Data Sharing in IoMT.
IEEE Internet Things J., September, 2024

Anti-Quantum Certificateless Group Authentication for Massive Accessing IoT Devices.
IEEE Internet Things J., May, 2024

Cooperative Authentication Scheme for Heterogeneous Networks Based on Identity Group Signature and Blockchain.
IEEE Trans. Veh. Technol., January, 2024

A robust and effective 3-factor authentication protocol for smart factory in IIoT.
Comput. Commun., 2024

2023
Anonymous Authentication Protocol Based on Physical Unclonable Function and Elliptic Curve Cryptography for Smart Grid.
IEEE Syst. J., December, 2023

Efficient ECC-Based Conditional Privacy-Preserving Aggregation Signature Scheme in V2V.
IEEE Trans. Veh. Technol., November, 2023

A Rivest-Shamir-Adleman-Based Robust and Effective Three-Factor User Authentication Protocol for Healthcare Use in Wireless Body Area Networks.
Sensors, November, 2023

Deep Reinforcement Learning-Based Intelligent Security Forwarding Strategy for VANET.
Sensors, February, 2023

Secure and Lightweight User Authentication Scheme for Cloud-Assisted Internet of Things.
IEEE Trans. Inf. Forensics Secur., 2023

Tree-IDS: An Incremental Intrusion Detection System for Connected Vehicles.
Proceedings of the 48th IEEE Conference on Local Computer Networks, 2023

Research on Cryptographic Misuse Detection for Android Applications Based on Dynamic and Static Combination.
Proceedings of the 2023 International Conference on Advances in Artificial Intelligence and Applications, 2023

2022
Understanding Node Capture Attacks in User Authentication Schemes for Wireless Sensor Networks.
IEEE Trans. Dependable Secur. Comput., 2022

A Robust Two-Factor User Authentication Scheme-Based ECC for Smart Home in IoT.
IEEE Syst. J., 2022

Bit-Level Automotive Controller Area Network Message Reverse Framework Based on Linear Regression.
Sensors, 2022

A novel model for voice command fingerprinting using deep learning.
J. Inf. Secur. Appl., 2022

A new efficient hierarchical multi-secret sharing scheme based on linear homogeneous recurrence relations.
Inf. Sci., 2022

Efficient privacy-preserving user authentication scheme with forward secrecy for industry 4.0.
Sci. China Inf. Sci., 2022

Demystifying the underground ecosystem of account registration bots.
Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2022

2020
Security Analysis on "Anonymous Authentication Scheme for Smart Home Environment with Provable Security".
Wirel. Commun. Mob. Comput., 2020

Efficient Multi-Factor User Authentication Protocol with Forward Secrecy for Real-Time Data Access in WSNs.
ACM Trans. Cyber Phys. Syst., 2020

2019
A Provably Secure Biometrics-Based Authentication Scheme for Multiserver Environment.
Secur. Commun. Networks, 2019

Cloud-Aided Privacy Preserving User Authentication and Key Agreement Protocol for Internet of Things.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2019

2018
An Enhanced User Authentication Protocol Based on Elliptic Curve Cryptosystem in Cloud Computing Environment.
Wirel. Commun. Mob. Comput., 2018

A Secure and Anonymous Two-Factor Authentication Protocol in Multiserver Environment.
Secur. Commun. Networks, 2018

A New Approach to Security Analysis of Smart Home Authentication Systems.
Fundam. Informaticae, 2018

2017
An Enhanced Three-Factor User Authentication Scheme Using Elliptic Curve Cryptosystem for Wireless Sensor Networks.
Sensors, 2017

Cryptanalysis of Three Password-Based Remote User Authentication Schemes with Non-Tamper-Resistant Smart Card.
Secur. Commun. Networks, 2017

A lightweight password-based authentication protocol using smart card.
Int. J. Commun. Syst., 2017


  Loading...