Wei Wu

According to our database1, Wei Wu
  • authored at least 47 papers between 2006 and 2018.
  • has a "Dijkstra number"2 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2018
An over-the-air key establishment protocol using keyless cryptography.
Future Generation Comp. Syst., 2018

A variant of password authenticated key exchange protocol.
Future Generation Comp. Syst., 2018

2017
Efficient Hierarchical Identity-Based Signature With Batch Verification for Automatic Dependent Surveillance-Broadcast System.
IEEE Trans. Information Forensics and Security, 2017

Protecting Mobile Health Records in Cloud Computing: A Secure, Efficient, and Anonymous Design.
ACM Trans. Embedded Comput. Syst., 2017

Hybrid Recovery Strategy Based on Random Terrain in Wireless Sensor Networks.
Scientific Programming, 2017

Uncertain random spectra: a new metric for assessing the survivability of mobile wireless sensor networks.
Soft Comput., 2017

Towards secure and cost-effective fuzzy access control in mobile cloud computing.
Soft Comput., 2017

A new universal designated verifier transitive signature scheme for big graph data.
J. Comput. Syst. Sci., 2017

2016
Efficient and Anonymous Mobile User Authentication Protocol Using Self-Certified Public Key Cryptography for Multi-Server Architectures.
IEEE Trans. Information Forensics and Security, 2016

Certificate-based encryption resilient to key leakage.
Journal of Systems and Software, 2016

Worm propagation model in mobile network.
Concurrency and Computation: Practice and Experience, 2016

An Efficient Secure Channel Free Searchable Encryption Scheme with Multiple Keywords.
Proceedings of the Network and System Security - 10th International Conference, 2016

2015
Cooperative attribute-based access control for enterprise computing system.
IJES, 2015

Certificate-Based Encryption Resilient to Key Leakage.
IACR Cryptology ePrint Archive, 2015

A reliable recommendation and privacy-preserving based cross-layer reputation mechanism for mobile cloud computing.
Future Generation Comp. Syst., 2015

An Efficient Connected Dominating Set Algorithm in WSNS Based on the Induced Tree of the Crossed Cube.
Applied Mathematics and Computer Science, 2015

A trustworthy access control model for mobile cloud computing based on reputation and mechanism design.
Ad Hoc Networks, 2015

Lightweight Anonymous Authentication for Ad Hoc Group: A Ring Signature Approach.
Proceedings of the Provable Security, 2015

PEVTS: Privacy-Preserving Electric Vehicles Test-Bedding Scheme.
Proceedings of the 21st IEEE International Conference on Parallel and Distributed Systems, 2015

2014
A local joint fast handoff scheme in cognitive wireless mesh networks.
Security and Communication Networks, 2014

Dynamics stability in wireless sensor networks active defense model.
J. Comput. Syst. Sci., 2014

Optimizing wireless unicast and multicast sensor networks on the basis of evolutionary game theory.
Concurrency and Computation: Practice and Experience, 2014

The Social Feature-Based Priority Relation Graph of Mobile Social Networks.
Proceedings of the 17th IEEE International Conference on Computational Science and Engineering, 2014

2013
How to achieve non-repudiation of origin with privacy protection in cloud computing.
J. Comput. Syst. Sci., 2013

Software Service Signature (S3) for authentication in cloud computing.
Cluster Computing, 2013

Constructing Connected Dominating Set Based on Crossed Cube in WSN.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

2012
A Provably Secure Construction of Certificate-Based Encryption from Certificateless Encryption.
Comput. J., 2012

Certificateless Signatures: New Schemes and Security Models.
Comput. J., 2012

Physical-Layer Network Coding and Connected Dominating Set Based Routing Protocol in Wireless Multi-hop Network.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

Identity-Based Proxy Signature for Cloud Service in SaaS.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

2011
Preserving Transparency and Accountability in Optimistic Fair Exchange of Digital Signatures.
IEEE Trans. Information Forensics and Security, 2011

Optimistic Fair Exchange with Strong Resolution-Ambiguity.
IEEE Journal on Selected Areas in Communications, 2011

Provably secure server-aided verification signatures.
Computers & Mathematics with Applications, 2011

2010
Further Observations on Optimistic Fair Exchange Protocols in the Multi-user Setting.
Proceedings of the Public Key Cryptography, 2010

2009
Certificate-based Signatures Revisited.
J. UCS, 2009

2008
Cryptanalysis and improvement of an efficient certificateless signature scheme.
Journal of Communications and Networks, 2008

Secure universal designated verifier signature without random oracles.
Int. J. Inf. Sec., 2008

Certificate-Based Signatures: New Definitions and a Generic Construction from Certificateless Signatures.
Proceedings of the Information Security Applications, 9th International Workshop, 2008

Server-Aided Verification Signatures: Definitions and New Constructions.
Proceedings of the Provable Security, Second International Conference, 2008

2007
Convertible Undeniable Proxy Signatures: Security Models and Efficient Construction.
Proceedings of the Information Security Applications, 8th International Workshop, 2007

Provably Secure Pairing-Based Convertible Undeniable Signature with Short Signature Length.
Proceedings of the Pairing-Based Cryptography, 2007

Provably Secure Identity-Based Undeniable Signatures with Selective and Universal Convertibility.
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007

A Generic Construction for Universally-Convertible Undeniable Signatures.
Proceedings of the Cryptology and Network Security, 6th International Conference, 2007

Identity-Based Proxy Signature from Pairings.
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007

Certificateless Signature Revisited.
Proceedings of the Information Security and Privacy, 12th Australasian Conference, 2007

2006
Proxy Signature Without Random Oracles.
Proceedings of the Mobile Ad-hoc and Sensor Networks, Second International Conference, 2006

Universal Designated Verifier Signature Without Delegatability.
Proceedings of the Information and Communications Security, 8th International Conference, 2006


  Loading...