Feng Wang

Orcid: 0000-0003-0801-8726

Affiliations:
  • Fujian Normal University, College of Mathematics and Informatics, Fujian Provincial Key Laboratory of Network Security and Cryptology, Fuzhou, China


According to our database1, Feng Wang authored at least 19 papers between 2014 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Lightweight Public/Private Auditing Scheme for Resource-Constrained End Devices in Cloud Storage.
IEEE Trans. Cloud Comput., 2022

2020
Lightweight Certificate-Based Public/Private Auditing Scheme Based on Bilinear Pairing for Cloud Storage.
IEEE Access, 2020

User Privacy-Preserving Scheme Based on Anonymous Authentication in Smart Grid.
Proceedings of the Security and Privacy in Digital Economy, 2020

2019
Fuzzy Identity-Based Dynamic Auditing of Big Data on Cloud Storage.
IEEE Access, 2019

2018
Comments on "SCLPV: Secure Certificateless Public Verification for Cloud-Based Cyber-Physical-Social Systems Against Malicious Auditors".
IEEE Trans. Comput. Soc. Syst., 2018

Identity-based non-repudiable dynamic provable data possession in cloud storage.
Comput. Electr. Eng., 2018

2017
Strongly Secure Certificateless Signature Scheme in the Standard Model with Resisting Malicious-But-Passive KGC Attack Ability.
J. Inf. Sci. Eng., 2017

Secure CAS-based authentication scheme for mobile pay-TV systems.
Int. J. Commun. Syst., 2017

2016
Robust off-line e-cash scheme with recoverability and anonymity revocation.
Secur. Commun. Networks, 2016

Image Authentication and Self-Recovery Scheme Based on The Rehashing Model.
J. Inf. Hiding Multim. Signal Process., 2016

Secure and Efficient Identity-based Proxy Multi-signature Using Cubic Residues.
Int. J. Netw. Secur., 2016

Security Analysis on Secure Untraceable Off-line Electronic Cash System.
Int. J. Netw. Secur., 2016

Threshold Signature Scheme without Using Polynomial Interpolation.
Int. J. Netw. Secur., 2016

Robust image authentication scheme with self-repair capability for greyscale source document images via PNG format.
IET Image Process., 2016

2015
The credit card visual authentication scheme based on GF(28) field.
Multim. Tools Appl., 2015

Color PNG Image Authentication Scheme Based on Rehashing and Secret Sharing Method.
J. Inf. Hiding Multim. Signal Process., 2015

Group Authentication and Group Key Distribution for Ad Hoc Networks.
Int. J. Netw. Secur., 2015

Security Analysis on "Strongly Secure Certificateless Key-Insulated Signature Secure in the Standard Model".
Proceedings of the 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2015

2014
Simulatable and secure certificate-based threshold signature without pairings.
Secur. Commun. Networks, 2014


  Loading...