Wei Wang

According to our database1, Wei Wang
  • authored at least 16 papers between 2007 and 2017.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2017
Dynamic Searchable Public-Key Ciphertexts with Fast Performance and Practical Security.
IACR Cryptology ePrint Archive, 2017

Dynamic Searchable Symmetric Encryption with Physical Deletion and Small Leakage.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017

2016
Conditional Identity-Based Broadcast Proxy Re-Encryption and Its Application to Cloud Email.
IEEE Trans. Computers, 2016

Secure hybrid-indexed search for high efficiency over keyword searchable ciphertexts.
Future Generation Comp. Syst., 2016

Generally Hybrid Proxy Re-Encryption: A Secure Data Sharing among Cryptographic Clouds.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Anonymous Identity-Based Broadcast Encryption with Constant Decryption Complexity and Strong Security.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2015
Generating Searchable Public-Key Ciphertexts With Hidden Structures for Fast Keyword Search.
IEEE Trans. Information Forensics and Security, 2015

A design for cloud-assisted Fair-Play Management System of online contests with provable security.
Future Generation Comp. Syst., 2015

One-Pass Anonymous Key Distribution in Batch for Secure Real-Time Mobile Services.
Proceedings of the 2015 IEEE International Conference on Mobile Services, MS 2015, New York City, NY, USA, June 27, 2015

GPU-based multifrontal optimizing method in sparse Cholesky factorization.
Proceedings of the 26th IEEE International Conference on Application-specific Systems, 2015

2014
Analysis of the Contribution of the Road Traffic Industry to the PM2.5 Emission for Different Land-Use Types.
Comp. Int. and Neurosc., 2014

A Secure Synchronized Reading system over time-critical online contests.
Proceedings of the IEEE International Conference on Communications, 2014

2013
Public-Key Encryption with Fuzzy Keyword Search: A Provably Secure Scheme under Keyword Guessing Attack.
IEEE Trans. Computers, 2013

2011
Public-Key Encryption with Cluster-Chain-based Keyword Search.
IACR Cryptology ePrint Archive, 2011

2007
Data management services and transfer scheme in ChinaGrid.
IJWGS, 2007

Data Management Services in ChinaGrid for Data Mining Applications.
Proceedings of the Emerging Technologies in Knowledge Discovery and Data Mining, 2007


  Loading...