Huaqun Wang

According to our database1, Huaqun Wang authored at least 76 papers between 2007 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
A Blockchain-Based Searchable Public-Key Encryption With Forward and Backward Privacy for Cloud-Assisted Vehicular Social Networks.
IEEE Trans. Veh. Technol., 2020

VOD-ADAC: Anonymous Distributed Fine-Grained Access Control Protocol with Verifiable Outsourced Decryption in Public Cloud.
IEEE Trans. Serv. Comput., 2020

SecureNLP: A System for Multi-Party Privacy-Preserving Natural Language Processing.
IEEE Trans. Inf. Forensics Secur., 2020

Secure outsourcing SIFT: Efficient and Privacy-Preserving Image Feature Extraction in the Encrypted Domain.
IEEE Trans. Dependable Secur. Comput., 2020

White-Box Implementation of Shamir's Identity-Based Signature Scheme.
IEEE Syst. J., 2020

A novel proxy-oriented public auditing scheme for cloud-based medical cyber physical systems.
J. Inf. Secur. Appl., 2020

Efficient and Secure Outsourcing Scheme for RSA Decryption in Internet of Things.
IEEE Internet Things J., 2020

Designated-verifier proof of assets for bitcoin exchange using elliptic curve cryptography.
Future Gener. Comput. Syst., 2020

VFL: A Verifiable Federated Learning with Privacy-Preserving for Big Data in Industrial IoT.
CoRR, 2020

Lightweight Certificate-Based Public/Private Auditing Scheme Based on Bilinear Pairing for Cloud Storage.
IEEE Access, 2020

A Privacy-Preserving and Verifiable Federated Learning Scheme.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

Proxy Re-Encryption Scheme For Complicated Access Control Factors Description in Hybrid Cloud.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

2019
Incentive and Unconditionally Anonymous Identity-Based Public Provable Data Possession.
IEEE Trans. Serv. Comput., 2019

A Distributed Access Control with Outsourced Computation in Fog Computing.
Secur. Commun. Networks, 2019

抗内部关键词猜测攻击的高效公钥可搜索加密方案 (Efficient Public-key Searchable Encryption Scheme Against Inside Keyword Guessing Attack).
计算机科学, 2019

Privacy-preserving incentive and rewarding scheme for crowd computing in social media.
Inf. Sci., 2019

BBARS: Blockchain-Based Anonymous Rewarding Scheme for V2G Networks.
IEEE Internet Things J., 2019

An Efficient and Provably Secure Authenticated Key Agreement Protocol for Fog-Based Vehicular Ad-Hoc Networks.
IEEE Internet Things J., 2019

Fine-grained multi-authority access control in IoT-enabled mHealth.
Ann. des Télécommunications, 2019

Cloud-Assisted EHR Sharing With Security and Privacy Preservation via Consortium Blockchain.
IEEE Access, 2019

2018
An Anonymous Multireceiver with Online/Offline Identity-Based Encryption.
Wirel. Commun. Mob. Comput., 2018

Security and Privacy Challenges for Internet-of-Things and Fog Computing.
Wirel. Commun. Mob. Comput., 2018

Certificateless Provable Data Possession Scheme for Cloud-Based Smart Grid Data Management Systems.
IEEE Trans. Ind. Informatics, 2018

A Provably-Secure Cross-Domain Handshake Scheme with Symptoms-Matching for Mobile Healthcare Social Network.
IEEE Trans. Dependable Secur. Comput., 2018

A Novel Secure Scheme for Supporting Complex SQL Queries over Encrypted Databases in Cloud Computing.
Secur. Commun. Networks, 2018

Anonymous and secure aggregation scheme in fog-based public cloud computing.
Future Gener. Comput. Syst., 2018

PAT: A precise reward scheme achieving anonymity and traceability for crowdcomputing in public clouds.
Future Gener. Comput. Syst., 2018

Anonymous biometrics-based authentication scheme with key distribution for mobile multi-server environment.
Future Gener. Comput. Syst., 2018

Identity-based non-repudiable dynamic provable data possession in cloud storage.
Comput. Electr. Eng., 2018

Anonymous Data Sharing Scheme in Public Cloud and Its Application in E-Health Record.
IEEE Access, 2018

2017
Lightweight Data Aggregation Scheme against Internal Attackers in Smart Grid Using Elliptic Curve Cryptography.
Wirel. Commun. Mob. Comput., 2017

Strong Key-Exposure Resilient Auditing for Secure Cloud Storage.
IEEE Trans. Inf. Forensics Secur., 2017

Optimized Charging Scheduling with Single Mobile Charger for Wireless Rechargeable Sensor Networks.
Symmetry, 2017

Efficient certificateless anonymous multi-receiver encryption scheme for mobile devices.
Soft Comput., 2017

Large Branching Tree Based Dynamic Provable Data Possession Scheme.
J. Inf. Sci. Eng., 2017

Insecurity of an identity-based public auditing protocol for the outsourced data in cloud storage.
Inf. Sci., 2017

Balanced anonymity and traceability for outsourcing small-scale data linear aggregation in the smart grid.
IET Inf. Secur., 2017

Identity-based provable data possession revisited: Security analysis and generic construction.
Comput. Stand. Interfaces, 2017

Analysis of handover authentication protocols for mobile wireless networks using identity-based public key cryptography.
Comput. Networks, 2017

Privacy-preserving certificateless provable data possession scheme for big data storage on cloud.
Appl. Math. Comput., 2017

Two-Factor Data Access Control With Efficient Revocation for Multi-Authority Cloud Storage Systems.
IEEE Access, 2017

2016
Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud.
IEEE Trans. Inf. Forensics Secur., 2016

A group key-policy attribute-based encryption with partial outsourcing decryption in wireless sensor networks.
Secur. Commun. Networks, 2016

Lightweight anonymous key distribution scheme for smart grid using elliptic curve cryptography.
IET Commun., 2016

Remote Data Integrity Checking and Sharing in Cloud-Based Health Internet of Things.
IEICE Trans. Inf. Syst., 2016

Efficient Dynamic Provable Data Possession from Dynamic Binary Tree.
Proceedings of the Provable Security, 2016

An Efficient Dynamic Provable Data Possession Scheme in Cloud Storage.
Proceedings of the Green, Pervasive, and Cloud Computing - 11th International Conference, 2016

2015
Identity-Based Distributed Provable Data Possession in Multicloud Storage.
IEEE Trans. Serv. Comput., 2015

TPP: Traceable Privacy-Preserving Communication and Precise Reward for Vehicle-to-Grid Networks in Smart Grids.
IEEE Trans. Inf. Forensics Secur., 2015

Anonymous multi-receiver remote data retrieval for pay-TV in public clouds.
IET Inf. Secur., 2015

Private Certificate-Based Remote Data Integrity Checking in Public Clouds.
Proceedings of the Computing and Combinatorics - 21st International Conference, 2015

Proxy Provable Data Possession with General Access Structure in Public Clouds.
Proceedings of the Information Security and Cryptology - 11th International Conference, 2015

2014
On the Knowledge Soundness of a Cooperative Provable Data Possession Scheme in Multicloud Storage.
IEEE Trans. Parallel Distrib. Syst., 2014

Signer-admissible strong designated verifier signature from bilinear pairings.
Secur. Commun. Networks, 2014

An anonymous data aggregation scheme for smart grid systems.
Secur. Commun. Networks, 2014

FRR: Fair remote retrieval of outsourced private medical records in electronic health networks.
J. Biomed. Informatics, 2014

Identity-based remote data possession checking in public clouds.
IET Inf. Secur., 2014

Insecurity of 'Improved Anonymous Multi-Receiver Identity-Based Encryption'.
Comput. J., 2014

Authentic and confidential policy distribution in software defined wireless network.
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2014

A Provably Secure Ring Signature Scheme with Bounded Leakage Resilience.
Proceedings of the Information Security Practice and Experience, 2014

Provably Secure Anonymous Multi-receiver Identity-Based Encryption with Shorter Ciphertext.
Proceedings of the IEEE 12th International Conference on Dependable, 2014

2013
Proxy Provable Data Possession in Public Clouds.
IEEE Trans. Serv. Comput., 2013

Simultaneous authentication and secrecy in identity-based data upload to cloud.
Cluster Computing, 2013

2012
On the Security of a Ticket-Based Anonymity System with Traceability Property in Wireless Mesh Networks.
IEEE Trans. Dependable Secur. Comput., 2012

Cryptanalysis and improvements of an anonymous multi-receiver identity-based encryption scheme.
IET Inf. Secur., 2012

Improved one-to-many authentication scheme for access control in pay-TV systems.
IET Inf. Secur., 2012

Analysis and Improvements of Two Identity Based Anonymous Signcryption Schemes for Multiple Receivers.
Proceedings of the 11th IEEE International Conference on Trust, 2012

An Improved Binary Authentication Tree Algorithm for Vehicular Networks.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

A New Identity Based Signcryption Scheme in the Standard Model.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

2011
Cryptanalysis of an Efficient Threshold Self-Healing Key Distribution Scheme.
IEEE Trans. Wirel. Commun., 2011

Cryptanalysis and Improvement of an Efficient CCA Secure PKE Scheme.
IACR Cryptol. ePrint Arch., 2011

Identity-Based Strong Key-Insulated Ring Signature Scheme in the Standard Model.
Proceedings of the Seventh International Conference on Mobile Ad-hoc and Sensor Networks, 2011

2009
Cryptanalysis of a Generalized Ring Signature Scheme.
IEEE Trans. Dependable Secur. Comput., 2009

2008
Cryptanalysis of Two Ring Signcryption Schemes.
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008

Cryptanalysis and Improvement of Shacham-Waters Ring Signature Scheme.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008

2007
Key management based on elliptic curve Paillier scheme in ad hoc networks.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007


  Loading...