Jian Wang

Affiliations:
  • Shanghai Second Polytechnic University, Department of Network Engineering, School of Computer and Information Engineering, China


According to our database1, Jian Wang authored at least 23 papers between 2011 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
A generic construction of identity-based proxy signature scheme in the standard model.
Int. J. Inf. Comput. Secur., 2019

2017
Strong Designated Verifier Signature Schemes with Undeniable Property and Their Applications.
Secur. Commun. Networks, 2017

An improved efficient identity-based proxy signature in the standard model.
Int. J. Comput. Math., 2017

Minimum cost deployment of wireless sensors with wake-up radios.
Proceedings of the 14th IEEE International Conference on Networking, Sensing and Control, 2017

2016
An efficient designated verifier signature scheme with pairing-free and low cost.
Secur. Commun. Networks, 2016

Short and provably secure designated verifier proxy signature scheme.
IET Inf. Secur., 2016

On Measuring and Modeling Governmental Accounts in Sina Microblog Service.
Proceedings of the 9th International Conference on Service Science, 2016

Event source identification and strength estimation in wireless sensor networks.
Proceedings of the 13th IEEE International Conference on Networking, Sensing, and Control, 2016

Secure and Pairing-Free Identity-Based Batch Verification Scheme in Vehicle Ad-Hoc Networks.
Proceedings of the Intelligent Computing Methodologies - 12th International Conference, 2016

An undeniable strong DSVS scheme with no bilinear pairings.
Proceedings of the 9th International Congress on Image and Signal Processing, 2016

2015
A short and highly efficient identity-based designated verifier proxy signature scheme.
Secur. Commun. Networks, 2015

A verifiable hierarchical circular shift cipher scheme for P2P chunk exchanges.
Peer-to-Peer Netw. Appl., 2015

Security Analysis of an Efficient Identity-Based Proxy Signature in the Standard Model.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015

Sustaining a perpetual wireless sensor network by multiple on-demand mobile wireless chargers.
Proceedings of the 12th IEEE International Conference on Networking, Sensing and Control, 2015

A Tight Security Reduction Designated Verifier Proxy Signature Scheme Without Random Oracle.
Proceedings of the Computational Science and Its Applications - ICCSA 2015, 2015

An Efficient Identity-Based Proxy Signature Scheme in the Standard Model with Tight Reduction.
Proceedings of the International Joint Conference, 2015

2014
Constant Size Ciphertext and Private Key HIBE without Random Oracles.
J. Inf. Sci. Eng., 2014

Programming wireless recharging for target-oriented rechargeable sensor networks.
Proceedings of 11th IEEE International Conference on Networking, Sensing and Control, 2014

A Preliminary Analysis of Yiban Microblogging Service.
Proceedings of the Enterprise Systems Conference, 2014

Characterizing Patterns of Chinese Yiban Blogging Service.
Proceedings of the 2014 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2014

2013
Short Hierarchical Identity-based Encryption in the Selective-ID Model.
J. Softw., 2013

Measurement and analysis of Shanghai Xinmin microblog website.
Proceedings of the 2013 IEEE International Conference on Granular Computing, 2013

2011
Provisioned sink placement in heterogeneous sensor networks.
Proceedings of the Eighth International Conference on Fuzzy Systems and Knowledge Discovery, 2011


  Loading...