Huaqun Wang

According to our database1, Huaqun Wang authored at least 60 papers between 2007 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
A Distributed Access Control with Outsourced Computation in Fog Computing.
Security and Communication Networks, 2019

Privacy-preserving incentive and rewarding scheme for crowd computing in social media.
Inf. Sci., 2019

BBARS: Blockchain-Based Anonymous Rewarding Scheme for V2G Networks.
IEEE Internet of Things Journal, 2019

Fine-grained multi-authority access control in IoT-enabled mHealth.
Annales des Télécommunications, 2019

2018
An Anonymous Multireceiver with Online/Offline Identity-Based Encryption.
Wireless Communications and Mobile Computing, 2018

Security and Privacy Challenges for Internet-of-Things and Fog Computing.
Wireless Communications and Mobile Computing, 2018

Certificateless Provable Data Possession Scheme for Cloud-Based Smart Grid Data Management Systems.
IEEE Trans. Industrial Informatics, 2018

A Provably-Secure Cross-Domain Handshake Scheme with Symptoms-Matching for Mobile Healthcare Social Network.
IEEE Trans. Dependable Sec. Comput., 2018

A Novel Secure Scheme for Supporting Complex SQL Queries over Encrypted Databases in Cloud Computing.
Security and Communication Networks, 2018

Anonymous and secure aggregation scheme in fog-based public cloud computing.
Future Generation Comp. Syst., 2018

PAT: A precise reward scheme achieving anonymity and traceability for crowdcomputing in public clouds.
Future Generation Comp. Syst., 2018

Anonymous biometrics-based authentication scheme with key distribution for mobile multi-server environment.
Future Generation Comp. Syst., 2018

Identity-based non-repudiable dynamic provable data possession in cloud storage.
Computers & Electrical Engineering, 2018

Anonymous Data Sharing Scheme in Public Cloud and Its Application in E-Health Record.
IEEE Access, 2018

2017
Lightweight Data Aggregation Scheme against Internal Attackers in Smart Grid Using Elliptic Curve Cryptography.
Wireless Communications and Mobile Computing, 2017

Strong Key-Exposure Resilient Auditing for Secure Cloud Storage.
IEEE Trans. Information Forensics and Security, 2017

Optimized Charging Scheduling with Single Mobile Charger for Wireless Rechargeable Sensor Networks.
Symmetry, 2017

Efficient certificateless anonymous multi-receiver encryption scheme for mobile devices.
Soft Comput., 2017

Large Branching Tree Based Dynamic Provable Data Possession Scheme.
J. Inf. Sci. Eng., 2017

Insecurity of an identity-based public auditing protocol for the outsourced data in cloud storage.
Inf. Sci., 2017

Balanced anonymity and traceability for outsourcing small-scale data linear aggregation in the smart grid.
IET Information Security, 2017

Identity-based provable data possession revisited: Security analysis and generic construction.
Computer Standards & Interfaces, 2017

Analysis of handover authentication protocols for mobile wireless networks using identity-based public key cryptography.
Computer Networks, 2017

Privacy-preserving certificateless provable data possession scheme for big data storage on cloud.
Applied Mathematics and Computation, 2017

Two-Factor Data Access Control With Efficient Revocation for Multi-Authority Cloud Storage Systems.
IEEE Access, 2017

2016
Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud.
IEEE Trans. Information Forensics and Security, 2016

A group key-policy attribute-based encryption with partial outsourcing decryption in wireless sensor networks.
Security and Communication Networks, 2016

Lightweight anonymous key distribution scheme for smart grid using elliptic curve cryptography.
IET Communications, 2016

Remote Data Integrity Checking and Sharing in Cloud-Based Health Internet of Things.
IEICE Transactions, 2016

Efficient Dynamic Provable Data Possession from Dynamic Binary Tree.
Proceedings of the Provable Security, 2016

An Efficient Dynamic Provable Data Possession Scheme in Cloud Storage.
Proceedings of the Green, Pervasive, and Cloud Computing - 11th International Conference, 2016

2015
Identity-Based Distributed Provable Data Possession in Multicloud Storage.
IEEE Trans. Services Computing, 2015

TPP: Traceable Privacy-Preserving Communication and Precise Reward for Vehicle-to-Grid Networks in Smart Grids.
IEEE Trans. Information Forensics and Security, 2015

Anonymous multi-receiver remote data retrieval for pay-TV in public clouds.
IET Information Security, 2015

Private Certificate-Based Remote Data Integrity Checking in Public Clouds.
Proceedings of the Computing and Combinatorics - 21st International Conference, 2015

Proxy Provable Data Possession with General Access Structure in Public Clouds.
Proceedings of the Information Security and Cryptology - 11th International Conference, 2015

2014
On the Knowledge Soundness of a Cooperative Provable Data Possession Scheme in Multicloud Storage.
IEEE Trans. Parallel Distrib. Syst., 2014

Signer-admissible strong designated verifier signature from bilinear pairings.
Security and Communication Networks, 2014

An anonymous data aggregation scheme for smart grid systems.
Security and Communication Networks, 2014

FRR: Fair remote retrieval of outsourced private medical records in electronic health networks.
Journal of Biomedical Informatics, 2014

Identity-based remote data possession checking in public clouds.
IET Information Security, 2014

Insecurity of 'Improved Anonymous Multi-Receiver Identity-Based Encryption'.
Comput. J., 2014

Authentic and confidential policy distribution in software defined wireless network.
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2014

A Provably Secure Ring Signature Scheme with Bounded Leakage Resilience.
Proceedings of the Information Security Practice and Experience, 2014

Provably Secure Anonymous Multi-receiver Identity-Based Encryption with Shorter Ciphertext.
Proceedings of the IEEE 12th International Conference on Dependable, 2014

2013
Proxy Provable Data Possession in Public Clouds.
IEEE Trans. Services Computing, 2013

Simultaneous authentication and secrecy in identity-based data upload to cloud.
Cluster Computing, 2013

2012
On the Security of a Ticket-Based Anonymity System with Traceability Property in Wireless Mesh Networks.
IEEE Trans. Dependable Sec. Comput., 2012

Cryptanalysis and improvements of an anonymous multi-receiver identity-based encryption scheme.
IET Information Security, 2012

Improved one-to-many authentication scheme for access control in pay-TV systems.
IET Information Security, 2012

Analysis and Improvements of Two Identity Based Anonymous Signcryption Schemes for Multiple Receivers.
Proceedings of the 11th IEEE International Conference on Trust, 2012

An Improved Binary Authentication Tree Algorithm for Vehicular Networks.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

A New Identity Based Signcryption Scheme in the Standard Model.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

2011
Cryptanalysis of an Efficient Threshold Self-Healing Key Distribution Scheme.
IEEE Trans. Wireless Communications, 2011

Cryptanalysis and Improvement of an Efficient CCA Secure PKE Scheme.
IACR Cryptology ePrint Archive, 2011

Identity-Based Strong Key-Insulated Ring Signature Scheme in the Standard Model.
Proceedings of the Seventh International Conference on Mobile Ad-hoc and Sensor Networks, 2011

2009
Cryptanalysis of a Generalized Ring Signature Scheme.
IEEE Trans. Dependable Sec. Comput., 2009

2008
Cryptanalysis of Two Ring Signcryption Schemes.
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008

Cryptanalysis and Improvement of Shacham-Waters Ring Signature Scheme.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008

2007
Key management based on elliptic curve Paillier scheme in ad hoc networks.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007


  Loading...