Hao Wang

According to our database1, Hao Wang authored at least 41 papers between 2009 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2019
Integrity Audit of Shared Cloud Data with Identity Tracking.
Security and Communication Networks, 2019

Efficient Attribute-Based Encryption with Privacy-Preserving Key Generation and Its Application in Industrial Cloud.
Security and Communication Networks, 2019

Privacy preserved wireless sensor location protocols based on mobile edge computing.
Computers & Security, 2019

Face Detection for Privacy Protected Images.
IEEE Access, 2019

Privacy-Preserving Wildcards Pattern Matching Protocol for IoT Applications.
IEEE Access, 2019

2018
Fuzzy matching and direct revocation: a new CP-ABE scheme from multilinear maps.
Soft Comput., 2018

Secure Cloud-Based EHR System Using Attribute-Based Cryptosystem and Blockchain.
J. Medical Systems, 2018

An ORAM-based privacy preserving data sharing scheme for cloud storage.
J. Inf. Sec. Appl., 2018

A dynamic integrity verification scheme of cloud storage data based on lattice and Bloom filter.
J. Inf. Sec. Appl., 2018

An efficient symmetric searchable encryption scheme for dynamic dataset in cloud computing paradigms.
IJHPCN, 2018

Position based cryptography with location privacy: A step for Fog Computing.
Future Generation Comp. Syst., 2018

Attribute-based handshake protocol for mobile healthcare social networks.
Future Generation Comp. Syst., 2018

Analysis on the Block Reward of Fork After Withholding (FAW).
Proceedings of the Network and System Security - 12th International Conference, 2018

Towards Security Authentication for IoT Devices with Lattice-Based ZK.
Proceedings of the Network and System Security - 12th International Conference, 2018

2017
Verifiable outsourced ciphertext-policy attribute-based encryption in cloud computing.
Soft Comput., 2017

Cloud-aided online/offline ciphertext-policy attribute-based encryption in the standard model.
IJGUC, 2017

New directly revocable attribute-based encryption scheme and its application in cloud storage environment.
Cluster Computing, 2017

2016
New large-universe multi-authority ciphertext-policy ABE scheme and its application in cloud storage systems.
J. High Speed Networks, 2016

Social rational secure multi-party computation.
Concurrency and Computation: Practice and Experience, 2016

Practical Server-Aided k-out-of-n Oblivious Transfer Protocol.
Proceedings of the Green, Pervasive, and Cloud Computing - 11th International Conference, 2016

2015
Several Oblivious Transfer Variants in Cut-and-Choose Scenario.
IJISP, 2015

New identity-based key-encapsulation mechanism and its applications in cloud computing.
IJHPCN, 2015

Server Aided Ciphertext-Policy Attribute-Based Encryption.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2015

2014
Unbounded Anonymous Hierarchical Identity-Based Encryption in the Standard Model.
JNW, 2014

Adaptively Anonymous Public-Key Broadcast Encryption Scheme without Random Oracle.
JNW, 2014

Social rational secure multi-party computation.
Concurrency and Computation: Practice and Experience, 2014

Hierarchial Identity-Based Encryption Scheme from Multilinear Maps.
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014

2013
Identity-Based Key-Encapsulation Mechanism from Multilinear Maps.
IACR Cryptology ePrint Archive, 2013

A New Privacy-Preserving Broadcast Encryption Scheme from DPVS.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Identity-Based Authenticate Key Exchange Protocol from Lattice.
Proceedings of the Ninth International Conference on Computational Intelligence and Security, 2013

2012
Rational secret sharing with semi-rational players.
IJGUC, 2012

Repeated rational secret sharing, revisited.
IJGUC, 2012

2011
A Scalable ID-based Constant-round AGKE Protocol with Logarithmic Computation Complexity.
JNW, 2011

Attribute-Based Authenticated Key Exchange Protocol with General Relations.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

Concurrent Non-malleable Statistically Hiding Commitment.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

2010
Generalized Hierarchical Identity-Based Signcryption.
JCP, 2010

Asymmetric Group Key Agreement with Traitor Traceability.
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010

A Fully Anonymous Identity-Based Signcryption Scheme in the Standard Model.
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010

2009
Revocable Attribute-based Key Agreement Protocol without Random Oracles.
JNW, 2009

A Provably-Secure Password-Authenticated Group Key Agreement in the Standard Model.
JNW, 2009

A Provably Secure Two-Party Attribute-Based Key Agreement Protocol.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009


  Loading...