Wei Wu

Orcid: 0000-0003-0343-4632

Affiliations:
  • Fujian Normal University, School of Mathematics and Computer Science, Fuzhou, China
  • University of Wollongong, School of Computer Science and Software Engineering, Australia (former)


According to our database1, Wei Wu authored at least 84 papers between 2006 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
LPDB: Lightweight Policy-Driven Blockchain With Batch Verification for Rail Transit Systems.
IEEE Trans. Veh. Technol., April, 2024

Inner product encryption from Middle-Product Learning With Errors.
Comput. Stand. Interfaces, January, 2024

SM2-DualRing: Efficient SM2-based ring signature schemes with logarithmic size.
Comput. Stand. Interfaces, January, 2024

Towards Sustainable Trust: A Practical SGX Aided Anonymous Reputation System.
IEEE Trans. Sustain. Comput., 2024

Analysis and Construction of Zero-Knowledge Proofs for the MinRank Problem.
Comput. J., 2024

2023
A Lattice-Based Redactable Signature Scheme using Cryptographic Accumulators for Trees.
Comput. J., December, 2023

Deep-Reuse-Enabled Common Satellite Network via Collaborative Blockchains: Architecture, Challenges, and Solutions.
IEEE Commun. Mag., August, 2023

Dual-Anonymous Off-Line Electronic Cash for Mobile Payment.
IEEE Trans. Mob. Comput., June, 2023

Lightweight Authentication Scheme for Data Dissemination in Cloud-Assisted Healthcare IoT.
IEEE Trans. Computers, May, 2023

Statistical zero-knowledge and analysis of rank-metric zero-knowledge proofs of knowledge.
Theor. Comput. Sci., March, 2023

An Efficient Blockchain-Based Conditional Privacy-Preserving Authentication Protocol for VANETs.
IEEE Trans. Veh. Technol., 2023

Blockwise Rank Decoding Problem and LRPC Codes: Cryptosystems with Smaller Sizes.
IACR Cryptol. ePrint Arch., 2023

Blockwise Rank Decoding Problem and LRPC Codes: Cryptosystems with Smaller Sizes.
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023

2022
Differentially Oblivious Data Analysis With Intel SGX: Design, Optimization, and Evaluation.
IEEE Trans. Dependable Secur. Comput., 2022

Provably Secure Online/Offline Identity-Based Signature Scheme Based on SM9.
Comput. J., 2022

Inner Product Encryption from Middle-Product Learning with Errors.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2022

A Combination Reduction Algorithm and Its Application.
Proceedings of the Network and System Security - 16th International Conference, 2022

2021
Leakage-Free Dissemination of Authenticated Tree-Structured Data With Multi-Party Control.
IEEE Trans. Computers, 2021

Verifiable image revision from chameleon hashes.
Cybersecur., 2021

Privacy-Aware Image Authentication from Cryptographic Primitives.
Comput. J., 2021

2020
Authenticated Data Redaction with Fine-Grained Control.
IEEE Trans. Emerg. Top. Comput., 2020

A code-based signature scheme from the Lyubashevsky framework.
Theor. Comput. Sci., 2020

A universal designated multi verifiers content extraction signature scheme.
Int. J. Comput. Sci. Eng., 2020

An improved Durandal signature scheme.
Sci. China Inf. Sci., 2020

Efficient and secure image authentication with robustness and versatility.
Sci. China Inf. Sci., 2020

2019
Privacy-preserving authentication for general directed graphs in industrial IoT.
Inf. Sci., 2019

Top-Level Secure Certificateless Signature Against Malicious-But-Passive KGC.
IEEE Access, 2019

2018
GO-CP-ABE: group-oriented ciphertext-policy attribute-based encryption.
Int. J. Embed. Syst., 2018

An over-the-air key establishment protocol using keyless cryptography.
Future Gener. Comput. Syst., 2018

A variant of password authenticated key exchange protocol.
Future Gener. Comput. Syst., 2018

A New Design of Online/Offline Signatures Based on Lattice.
Proceedings of the Information Security Practice and Experience, 2018

Image Authentication for Permissible Cropping.
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018

2017
Efficient Hierarchical Identity-Based Signature With Batch Verification for Automatic Dependent Surveillance-Broadcast System.
IEEE Trans. Inf. Forensics Secur., 2017

Protecting Mobile Health Records in Cloud Computing: A Secure, Efficient, and Anonymous Design.
ACM Trans. Embed. Comput. Syst., 2017

Hybrid Recovery Strategy Based on Random Terrain in Wireless Sensor Networks.
Sci. Program., 2017

Uncertain random spectra: a new metric for assessing the survivability of mobile wireless sensor networks.
Soft Comput., 2017

Towards secure and cost-effective fuzzy access control in mobile cloud computing.
Soft Comput., 2017

A new universal designated verifier transitive signature scheme for big graph data.
J. Comput. Syst. Sci., 2017

Virtual Backbone Scheduling with Connected Domatic Partition in Wireless Sensor Networks.
Ad Hoc Sens. Wirel. Networks, 2017

Linearly Homomorphic Signatures with Designated Entities.
Proceedings of the Information Security Practice and Experience, 2017

An Efficient and Secure Design of Redactable Signature Scheme with Redaction Condition Control.
Proceedings of the Green, Pervasive, and Cloud Computing - 12th International Conference, 2017

DABEHR: Decentralized Attribute-Based Electronic Health Record System with Constant-Size Storage Complexity.
Proceedings of the Green, Pervasive, and Cloud Computing - 12th International Conference, 2017

A Universal Designated Multi-Verifier Transitive Signature Scheme.
Proceedings of the Information Security and Cryptology - 13th International Conference, 2017

2016
Efficient and Anonymous Mobile User Authentication Protocol Using Self-Certified Public Key Cryptography for Multi-Server Architectures.
IEEE Trans. Inf. Forensics Secur., 2016

Worm propagation model in mobile network.
Concurr. Comput. Pract. Exp., 2016

An Efficient Secure Channel Free Searchable Encryption Scheme with Multiple Keywords.
Proceedings of the Network and System Security - 10th International Conference, 2016

A New Transitive Signature Scheme.
Proceedings of the Network and System Security - 10th International Conference, 2016

2015
Influences of Removable Devices on the Anti-Threat Model: Dynamic Analysis and Control Strategies.
Inf., 2015

Cooperative attribute-based access control for enterprise computing system.
Int. J. Embed. Syst., 2015

Certificate-Based Encryption Resilient to Key Leakage.
IACR Cryptol. ePrint Arch., 2015

A reliable recommendation and privacy-preserving based cross-layer reputation mechanism for mobile cloud computing.
Future Gener. Comput. Syst., 2015

An Efficient Connected Dominating Set Algorithm in WSNS Based on the Induced Tree of the Crossed Cube.
Int. J. Appl. Math. Comput. Sci., 2015

A trustworthy access control model for mobile cloud computing based on reputation and mechanism design.
Ad Hoc Networks, 2015

Lightweight Anonymous Authentication for Ad Hoc Group: A Ring Signature Approach.
Proceedings of the Provable Security, 2015

PEVTS: Privacy-Preserving Electric Vehicles Test-Bedding Scheme.
Proceedings of the 21st IEEE International Conference on Parallel and Distributed Systems, 2015

2014
A local joint fast handoff scheme in cognitive wireless mesh networks.
Secur. Commun. Networks, 2014

Dynamics stability in wireless sensor networks active defense model.
J. Comput. Syst. Sci., 2014

Optimizing wireless unicast and multicast sensor networks on the basis of evolutionary game theory.
Concurr. Comput. Pract. Exp., 2014

The Social Feature-Based Priority Relation Graph of Mobile Social Networks.
Proceedings of the 17th IEEE International Conference on Computational Science and Engineering, 2014

2013
How to achieve non-repudiation of origin with privacy protection in cloud computing.
J. Comput. Syst. Sci., 2013

Software Service Signature (S3) for authentication in cloud computing.
Clust. Comput., 2013

Constructing Connected Dominating Set Based on Crossed Cube in WSN.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

2012
A Provably Secure Construction of Certificate-Based Encryption from Certificateless Encryption.
Comput. J., 2012

Certificateless Signatures: New Schemes and Security Models.
Comput. J., 2012

Physical-Layer Network Coding and Connected Dominating Set Based Routing Protocol in Wireless Multi-hop Network.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

Identity-Based Proxy Signature for Cloud Service in SaaS.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

2011
Preserving Transparency and Accountability in Optimistic Fair Exchange of Digital Signatures.
IEEE Trans. Inf. Forensics Secur., 2011

Optimistic Fair Exchange with Strong Resolution-Ambiguity.
IEEE J. Sel. Areas Commun., 2011

Provably secure server-aided verification signatures.
Comput. Math. Appl., 2011

2010
Further Observations on Optimistic Fair Exchange Protocols in the Multi-user Setting.
Proceedings of the Public Key Cryptography, 2010

2009
Certificate-based Signatures Revisited.
J. Univers. Comput. Sci., 2009

2008
Cryptanalysis and improvement of an efficient certificateless signature scheme.
J. Commun. Networks, 2008

Secure universal designated verifier signature without random oracles.
Int. J. Inf. Sec., 2008

Certificate-Based Signatures: New Definitions and a Generic Construction from Certificateless Signatures.
Proceedings of the Information Security Applications, 9th International Workshop, 2008

Server-Aided Verification Signatures: Definitions and New Constructions.
Proceedings of the Provable Security, Second International Conference, 2008

2007
Convertible Undeniable Proxy Signatures: Security Models and Efficient Construction.
Proceedings of the Information Security Applications, 8th International Workshop, 2007

A Provably Secure Ring Signature Scheme in Certificateless Cryptography.
Proceedings of the Provable Security, 2007

Provably Secure Pairing-Based Convertible Undeniable Signature with Short Signature Length.
Proceedings of the Pairing-Based Cryptography, 2007

Provably Secure Identity-Based Undeniable Signatures with Selective and Universal Convertibility.
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007

A Generic Construction for Universally-Convertible Undeniable Signatures.
Proceedings of the Cryptology and Network Security, 6th International Conference, 2007

Identity-Based Proxy Signature from Pairings.
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007

Certificateless Signature Revisited.
Proceedings of the Information Security and Privacy, 12th Australasian Conference, 2007

2006
Proxy Signature Without Random Oracles.
Proceedings of the Mobile Ad-hoc and Sensor Networks, Second International Conference, 2006

Universal Designated Verifier Signature Without Delegatability.
Proceedings of the Information and Communications Security, 8th International Conference, 2006


  Loading...