Jiwen Zeng

According to our database1, Jiwen Zeng authored at least 18 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
An Efficient Certificateless Anonymous Signcryption Scheme for WBAN.
Sensors, August, 2024

2023
Anonymous Certificateless Multireceiver Encryption Scheme for Mobile Communication Devices.
IEEE Syst. J., March, 2023

Identity-based ring signature scheme with multi-designated verifiers.
Int. J. Ad Hoc Ubiquitous Comput., 2023

2022
Correction to: Fuzzy Identity-Based Signature in Standard Model.
Wirel. Pers. Commun., 2022

Fuzzy Identity-Based Signature in Standard Model.
Wirel. Pers. Commun., 2022

Certificateless Proxy Signcryption in the Standard Model for a UAV Network.
IEEE Internet Things J., 2022

2021
Forward secure certificateless proxy multi-signature scheme.
Int. J. Electron. Secur. Digit. Forensics, 2021

2019
An efficient certificateless multi-receiver threshold decryption scheme.
RAIRO Theor. Informatics Appl., 2019

2018
Efficient Retrieval Over Documents Encrypted by Attributes in Cloud Computing.
IEEE Trans. Inf. Forensics Secur., 2018

Fibonacci and Lucas Numbers of the Form 2<sup><i>a</i></sup> + 3<sup><i>b</i></sup> + 5<sup><i>c</i></sup> + 7<sup><i>d</i></sup>.
Symmetry, 2018

Source-location privacy full protection in wireless sensor networks.
Inf. Sci., 2018

Multi-proxy Multi-signature without Pairing from Certificateless Cryptography.
Int. J. Netw. Secur., 2018

2017
All-Direction Random Routing for Source-Location Privacy Protecting against Parasitic Sensor Networks.
Sensors, 2017

2016
Efficient Certificateless Proxy Signature Scheme.
Int. J. Found. Comput. Sci., 2016

2014
Two new identity-based threshold ring signature schemes.
Theor. Comput. Sci., 2014

A new identity-based ring signcryption scheme.
Int. J. Electron. Secur. Digit. Forensics, 2014

2012
Normal Criterion Concerning Shared Values.
J. Appl. Math., 2012

2010
Fast Scalar Multiplications on Hyperelliptic Curve Cryptosystems.
Informatica (Slovenia), 2010


  Loading...