Shangping Wang

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Bibliography

2023
FortunChain: EC-VRF-Based Scalable Blockchain System for Realizing State Sharding.
IEEE Trans. Netw. Serv. Manag., December, 2023

A differential evolution algorithm with a superior-inferior mutation scheme.
Soft Comput., December, 2023

Optimal incentive strategy in blockchain-based mobile crowdsensing using game theory.
Comput. Networks, December, 2023

Game Model of Optimal Quality Experience Strategy for Internet of Vehicles Bandwidth Service Based on DAG Blockchain.
IEEE Trans. Veh. Technol., July, 2023

Scalable and fault-tolerant selection method of verification and accounting nodes for permissionless blockchain.
Comput. Networks, June, 2023

A two-layer consortium blockchain with transaction privacy protection based on sharding technology.
J. Inf. Secur. Appl., May, 2023

Attribute Based Conjunctive Keywords Search With Verifiability and Fair Payment Using Blockchain.
IEEE Trans. Serv. Comput., 2023

2022
Authorized Data Secure Access Scheme With Specified Time and Relevance Ranked Keyword Search for Industrial Cloud Platforms.
IEEE Syst. J., 2022

A Secure Subscription-Push Service Scheme Based on Blockchain and Edge Computing for IoT.
KSII Trans. Internet Inf. Syst., 2022

Attribute-based access control scheme for data sharing on hyperledger fabric.
J. Inf. Secur. Appl., 2022

DAG blockchain-based lightweight authentication and authorization scheme for IoT devices.
J. Inf. Secur. Appl., 2022

Permissioned Blockchain Frame for Secure Federated Learning.
IEEE Commun. Lett., 2022

2020
Non-Repudiation Storage and Access Control Scheme of Insurance Data Based on Blockchain in IPFS.
IEEE Access, 2020

Blockchain-Based Secure Storage and Access Scheme For Electronic Medical Records in IPFS.
IEEE Access, 2020

2019
Time and Attribute Based Dual Access Control and Data Integrity Verifiable Scheme in Cloud Computing Applications.
IEEE Access, 2019

A Differential Privacy Support Vector Machine Classifier Based on Dual Variable Perturbation.
IEEE Access, 2019

Blockchain-Based Personal Health Records Sharing Scheme With Data Integrity Verifiable.
IEEE Access, 2019

KS-ABESwET: A Keyword Searchable Attribute-Based Encryption Scheme With Equality Test in the Internet of Things.
IEEE Access, 2019

Blockchain-Based Fair Payment Protocol for Deduplication Cloud Storage System.
IEEE Access, 2019

A Secure Cloud Storage Framework With Access Control Based on Blockchain.
IEEE Access, 2019

Auditable Protocols for Fair Payment and Physical Asset Delivery Based on Smart Contracts.
IEEE Access, 2019

EIDM: A Ethereum-Based Cloud User Identity Management Protocol.
IEEE Access, 2019

Smart Contract-Based Product Traceability System in the Supply Chain Scenario.
IEEE Access, 2019

Verifiable and Multi-Keyword Searchable Attribute-Based Encryption Scheme for Cloud Storage.
IEEE Access, 2019

Multi-Keyword Searchable and Data Verifiable Attribute-Based Encryption Scheme for Cloud Storage.
IEEE Access, 2019

A Keyword-Searchable ABE Scheme From Lattice in Cloud Storage Environment.
IEEE Access, 2019

2018
Lattice-based ring signature scheme under the random oracle model.
Int. J. High Perform. Comput. Netw., 2018

Efficient revocable and grantable attribute-based encryption from lattices with fine-grained access control.
IET Inf. Secur., 2018

Revocable Identity-Based Encryption Scheme Under LWE Assumption in the Standard Model.
IEEE Access, 2018

Efficiently Revocable and Searchable Attribute-Based Encryption Scheme for Mobile Cloud Storage.
IEEE Access, 2018

A Blockchain-Based Framework for Data Sharing With Fine-Grained Access Control in Decentralized Storage Systems.
IEEE Access, 2018

2017
Reversible data hiding in encrypted image with separable data extraction from image decryption.
Multim. Tools Appl., 2017

A Multi-Authority Key-Policy ABE Scheme from Lattices in Mobile Ad Hoc Networks.
Ad Hoc Sens. Wirel. Networks, 2017

An efficient algorithm for frequent pattern mining based on privacy-preserving.
Proceedings of the 13th International Conference on Natural Computation, 2017

2016
Keypoints-Based Image Passive Forensics Method for Copy-Move Attacks.
Int. J. Pattern Recognit. Artif. Intell., 2016

Source camera identification from image texture features.
Neurocomputing, 2016

Multi-User and Keyword-Based Searchable Encryption Scheme.
Proceedings of the 12th International Conference on Computational Intelligence and Security, 2016

2015
Multi-party concurrent signatures scheme from lattice.
Int. J. Inf. Commun. Technol., 2015

An Efficient Identity-Based Signature Scheme for Vehicular Communications.
Proceedings of the 11th International Conference on Computational Intelligence and Security, 2015

2014
Lattice-Based Ring Signature Scheme under the Random Oracle Model.
CoRR, 2014

Large Universe Attribute-Based Encryption Scheme from Lattices.
CoRR, 2014

A Multi-users Searchable Encryption Scheme with Proxy Re-encryption.
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014

2013
Newmultivariate hash function quadratic polynomials multiplying linear polynomials.
IET Inf. Secur., 2013

A Multi-user Searchable Symmetric Encryption Scheme for Cloud Storage System.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Lattice-Based Multi-party Concurrent Signatures Scheme.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Evaluable Secure Ranked Keyword Search Scheme over Encrypted Cloud Data.
Proceedings of the Ninth International Conference on Computational Intelligence and Security, 2013

2011
An Authentication Protocol for RFID Tag and Its Simulation.
J. Networks, 2011

An Identity-Based Mediated Signature Scheme Without Trusted PKG.
Informatica (Slovenia), 2011

Ring signature scheme based on multivariate public key cryptosystems.
Comput. Math. Appl., 2011

A New Multivariate Hash Function with HAIFA Construction.
Proceedings of the IEEE 10th International Conference on Trust, 2011

(r, n)-Threshold Image Secret Sharing Methods with Small Shadow Images.
Proceedings of the Digital Forensics and Watermarking - 10th International Workshop, 2011

2010
Leakage-resilient identity-based encryption scheme.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2010

ID-Based Authenticated Multi-group Keys Agreement Scheme for Computing Grid.
Proceedings of the Artificial Intelligence and Computational Intelligence, 2010

2008
An Improved ID-based Restrictive Partially Blind Signature Scheme.
Proceedings of the Ninth ACIS International Conference on Software Engineering, 2008

A New Certificateless Electronic Cash Scheme with Multiple Banks Based on Group Signatures.
Proceedings of The International Symposium on Electronic Commerce and Security, 2008

ID-Based Convertible Limited (Multi-)Verifier Signature Scheme.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008


  Loading...