Wei Wu
According to our database1,
Wei Wu
authored at least 58 papers
between 2006 and 2020.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2020
IEEE Trans. Emerg. Top. Comput., 2020
Theor. Comput. Sci., 2020
Int. J. Comput. Sci. Eng., 2020
2019
Inf. Sci., 2019
IACR Cryptol. ePrint Arch., 2019
2018
Future Gener. Comput. Syst., 2018
Future Gener. Comput. Syst., 2018
Proceedings of the Information Security Practice and Experience, 2018
2017
Efficient Hierarchical Identity-Based Signature With Batch Verification for Automatic Dependent Surveillance-Broadcast System.
IEEE Trans. Inf. Forensics Secur., 2017
Protecting Mobile Health Records in Cloud Computing: A Secure, Efficient, and Anonymous Design.
ACM Trans. Embed. Comput. Syst., 2017
Sci. Program., 2017
Uncertain random spectra: a new metric for assessing the survivability of mobile wireless sensor networks.
Soft Comput., 2017
Soft Comput., 2017
J. Comput. Syst. Sci., 2017
Virtual Backbone Scheduling with Connected Domatic Partition in Wireless Sensor Networks.
Ad Hoc Sens. Wirel. Networks, 2017
Proceedings of the Information Security Practice and Experience, 2017
An Efficient and Secure Design of Redactable Signature Scheme with Redaction Condition Control.
Proceedings of the Green, Pervasive, and Cloud Computing - 12th International Conference, 2017
Proceedings of the Information Security and Cryptology - 13th International Conference, 2017
2016
Efficient and Anonymous Mobile User Authentication Protocol Using Self-Certified Public Key Cryptography for Multi-Server Architectures.
IEEE Trans. Inf. Forensics Secur., 2016
An Efficient Secure Channel Free Searchable Encryption Scheme with Multiple Keywords.
Proceedings of the Network and System Security - 10th International Conference, 2016
2015
Influences of Removable Devices on the Anti-Threat Model: Dynamic Analysis and Control Strategies.
Inf., 2015
Int. J. Embed. Syst., 2015
IACR Cryptol. ePrint Arch., 2015
A reliable recommendation and privacy-preserving based cross-layer reputation mechanism for mobile cloud computing.
Future Gener. Comput. Syst., 2015
An Efficient Connected Dominating Set Algorithm in WSNS Based on the Induced Tree of the Crossed Cube.
Int. J. Appl. Math. Comput. Sci., 2015
A trustworthy access control model for mobile cloud computing based on reputation and mechanism design.
Ad Hoc Networks, 2015
Proceedings of the Provable Security, 2015
Proceedings of the 21st IEEE International Conference on Parallel and Distributed Systems, 2015
2014
Secur. Commun. Networks, 2014
J. Comput. Syst. Sci., 2014
Optimizing wireless unicast and multicast sensor networks on the basis of evolutionary game theory.
Concurr. Comput. Pract. Exp., 2014
Proceedings of the 17th IEEE International Conference on Computational Science and Engineering, 2014
2013
J. Comput. Syst. Sci., 2013
Clust. Comput., 2013
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
2012
A Provably Secure Construction of Certificate-Based Encryption from Certificateless Encryption.
Comput. J., 2012
Physical-Layer Network Coding and Connected Dominating Set Based Routing Protocol in Wireless Multi-hop Network.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012
2011
Preserving Transparency and Accountability in Optimistic Fair Exchange of Digital Signatures.
IEEE Trans. Inf. Forensics Secur., 2011
IEEE J. Sel. Areas Commun., 2011
2010
Further Observations on Optimistic Fair Exchange Protocols in the Multi-user Setting.
Proceedings of the Public Key Cryptography, 2010
2009
2008
J. Commun. Networks, 2008
Int. J. Inf. Sec., 2008
Certificate-Based Signatures: New Definitions and a Generic Construction from Certificateless Signatures.
Proceedings of the Information Security Applications, 9th International Workshop, 2008
Proceedings of the Provable Security, Second International Conference, 2008
2007
Proceedings of the Information Security Applications, 8th International Workshop, 2007
Provably Secure Pairing-Based Convertible Undeniable Signature with Short Signature Length.
Proceedings of the Pairing-Based Cryptography, 2007
Provably Secure Identity-Based Undeniable Signatures with Selective and Universal Convertibility.
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007
Proceedings of the Cryptology and Network Security, 6th International Conference, 2007
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007
Proceedings of the Information Security and Privacy, 12th Australasian Conference, 2007
2006
Proceedings of the Mobile Ad-hoc and Sensor Networks, Second International Conference, 2006
Proceedings of the Information and Communications Security, 8th International Conference, 2006