Wei Wu

According to our database1, Wei Wu authored at least 58 papers between 2006 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.



In proceedings 
PhD thesis 


Online presence:

On csauthors.net:


Authenticated Data Redaction with Fine-Grained Control.
IEEE Trans. Emerg. Top. Comput., 2020

A code-based signature scheme from the Lyubashevsky framework.
Theor. Comput. Sci., 2020

A universal designated multi verifiers content extraction signature scheme.
Int. J. Comput. Sci. Eng., 2020

An improved Durandal signature scheme.
Sci. China Inf. Sci., 2020

Privacy-preserving authentication for general directed graphs in industrial IoT.
Inf. Sci., 2019

A New Code-based Signature Scheme with Shorter Public Key.
IACR Cryptol. ePrint Arch., 2019

An over-the-air key establishment protocol using keyless cryptography.
Future Gener. Comput. Syst., 2018

A variant of password authenticated key exchange protocol.
Future Gener. Comput. Syst., 2018

A New Design of Online/Offline Signatures Based on Lattice.
Proceedings of the Information Security Practice and Experience, 2018

Efficient Hierarchical Identity-Based Signature With Batch Verification for Automatic Dependent Surveillance-Broadcast System.
IEEE Trans. Inf. Forensics Secur., 2017

Protecting Mobile Health Records in Cloud Computing: A Secure, Efficient, and Anonymous Design.
ACM Trans. Embed. Comput. Syst., 2017

Hybrid Recovery Strategy Based on Random Terrain in Wireless Sensor Networks.
Sci. Program., 2017

Uncertain random spectra: a new metric for assessing the survivability of mobile wireless sensor networks.
Soft Comput., 2017

Towards secure and cost-effective fuzzy access control in mobile cloud computing.
Soft Comput., 2017

A new universal designated verifier transitive signature scheme for big graph data.
J. Comput. Syst. Sci., 2017

Virtual Backbone Scheduling with Connected Domatic Partition in Wireless Sensor Networks.
Ad Hoc Sens. Wirel. Networks, 2017

Linearly Homomorphic Signatures with Designated Entities.
Proceedings of the Information Security Practice and Experience, 2017

An Efficient and Secure Design of Redactable Signature Scheme with Redaction Condition Control.
Proceedings of the Green, Pervasive, and Cloud Computing - 12th International Conference, 2017

A Universal Designated Multi-Verifier Transitive Signature Scheme.
Proceedings of the Information Security and Cryptology - 13th International Conference, 2017

Efficient and Anonymous Mobile User Authentication Protocol Using Self-Certified Public Key Cryptography for Multi-Server Architectures.
IEEE Trans. Inf. Forensics Secur., 2016

Worm propagation model in mobile network.
Concurr. Comput. Pract. Exp., 2016

An Efficient Secure Channel Free Searchable Encryption Scheme with Multiple Keywords.
Proceedings of the Network and System Security - 10th International Conference, 2016

Influences of Removable Devices on the Anti-Threat Model: Dynamic Analysis and Control Strategies.
Inf., 2015

Cooperative attribute-based access control for enterprise computing system.
Int. J. Embed. Syst., 2015

Certificate-Based Encryption Resilient to Key Leakage.
IACR Cryptol. ePrint Arch., 2015

A reliable recommendation and privacy-preserving based cross-layer reputation mechanism for mobile cloud computing.
Future Gener. Comput. Syst., 2015

An Efficient Connected Dominating Set Algorithm in WSNS Based on the Induced Tree of the Crossed Cube.
Int. J. Appl. Math. Comput. Sci., 2015

A trustworthy access control model for mobile cloud computing based on reputation and mechanism design.
Ad Hoc Networks, 2015

Lightweight Anonymous Authentication for Ad Hoc Group: A Ring Signature Approach.
Proceedings of the Provable Security, 2015

PEVTS: Privacy-Preserving Electric Vehicles Test-Bedding Scheme.
Proceedings of the 21st IEEE International Conference on Parallel and Distributed Systems, 2015

A local joint fast handoff scheme in cognitive wireless mesh networks.
Secur. Commun. Networks, 2014

Dynamics stability in wireless sensor networks active defense model.
J. Comput. Syst. Sci., 2014

Optimizing wireless unicast and multicast sensor networks on the basis of evolutionary game theory.
Concurr. Comput. Pract. Exp., 2014

The Social Feature-Based Priority Relation Graph of Mobile Social Networks.
Proceedings of the 17th IEEE International Conference on Computational Science and Engineering, 2014

How to achieve non-repudiation of origin with privacy protection in cloud computing.
J. Comput. Syst. Sci., 2013

Software Service Signature (S3) for authentication in cloud computing.
Clust. Comput., 2013

Constructing Connected Dominating Set Based on Crossed Cube in WSN.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

A Provably Secure Construction of Certificate-Based Encryption from Certificateless Encryption.
Comput. J., 2012

Certificateless Signatures: New Schemes and Security Models.
Comput. J., 2012

Physical-Layer Network Coding and Connected Dominating Set Based Routing Protocol in Wireless Multi-hop Network.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

Identity-Based Proxy Signature for Cloud Service in SaaS.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

Preserving Transparency and Accountability in Optimistic Fair Exchange of Digital Signatures.
IEEE Trans. Inf. Forensics Secur., 2011

Optimistic Fair Exchange with Strong Resolution-Ambiguity.
IEEE J. Sel. Areas Commun., 2011

Provably secure server-aided verification signatures.
Comput. Math. Appl., 2011

Further Observations on Optimistic Fair Exchange Protocols in the Multi-user Setting.
Proceedings of the Public Key Cryptography, 2010

Certificate-based Signatures Revisited.
J. Univers. Comput. Sci., 2009

Cryptanalysis and improvement of an efficient certificateless signature scheme.
J. Commun. Networks, 2008

Secure universal designated verifier signature without random oracles.
Int. J. Inf. Sec., 2008

Certificate-Based Signatures: New Definitions and a Generic Construction from Certificateless Signatures.
Proceedings of the Information Security Applications, 9th International Workshop, 2008

Server-Aided Verification Signatures: Definitions and New Constructions.
Proceedings of the Provable Security, Second International Conference, 2008

Convertible Undeniable Proxy Signatures: Security Models and Efficient Construction.
Proceedings of the Information Security Applications, 8th International Workshop, 2007

Provably Secure Pairing-Based Convertible Undeniable Signature with Short Signature Length.
Proceedings of the Pairing-Based Cryptography, 2007

Provably Secure Identity-Based Undeniable Signatures with Selective and Universal Convertibility.
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007

A Generic Construction for Universally-Convertible Undeniable Signatures.
Proceedings of the Cryptology and Network Security, 6th International Conference, 2007

Identity-Based Proxy Signature from Pairings.
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007

Certificateless Signature Revisited.
Proceedings of the Information Security and Privacy, 12th Australasian Conference, 2007

Proxy Signature Without Random Oracles.
Proceedings of the Mobile Ad-hoc and Sensor Networks, Second International Conference, 2006

Universal Designated Verifier Signature Without Delegatability.
Proceedings of the Information and Communications Security, 8th International Conference, 2006