Wenbao Han

Orcid: 0000-0001-8955-8489

According to our database1, Wenbao Han authored at least 46 papers between 2003 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A framework for efficient cross-chain token transfers in blockchain networks.
J. King Saud Univ. Comput. Inf. Sci., February, 2024

General Pairwise Modification Framework for Reversible Data Hiding in JPEG Images.
IEEE Trans. Circuits Syst. Video Technol., January, 2024

Intrusion Detection Model for Internet of Vehicles Using GRIPCA and OWELM.
IEEE Access, 2024

2023
A data sharing method for remote medical system based on federated distillation learning and consortium blockchain.
Connect. Sci., December, 2023

A zero trust and blockchain-based defense model for smart electric vehicle chargers.
J. Netw. Comput. Appl., April, 2023

2022
A brain-inspired multibranch parallel interactive vision mechanism for advanced driver assistance systems.
Int. J. Sens. Networks, 2022

An overview of brain-like computing: Architecture, applications, and future trends.
Frontiers Neurorobotics, 2022

A novel zero-watermarking scheme based on NSCT-SVD and blockchain for video copyright.
EURASIP J. Wirel. Commun. Netw., 2022

An overview on cross-chain: Mechanism, platforms, challenges and advances.
Comput. Networks, 2022

A Novel Security Scheme for Mobile Healthcare in Digital Twin.
Proceedings of the Machine Learning for Cyber Security - 4th International Conference, 2022

FedTD: Efficiently Share Telemedicine Data with Federated Distillation Learning.
Proceedings of the Machine Learning for Cyber Security - 4th International Conference, 2022

2021
BSVMS: Novel Autonomous Trustworthy Scheme for Video Monitoring.
Wirel. Commun. Mob. Comput., 2021

BFLP: An Adaptive Federated Learning Framework for Internet of Vehicles.
Mob. Inf. Syst., 2021

2017
Accountable CP-ABE with Public Verifiability: How to Effectively Protect the Outsourced Data in Cloud.
Int. J. Found. Comput. Sci., 2017

New strategy for searching disturbance vector of SHA-1 collision attack.
Sci. China Inf. Sci., 2017

2016
SHA-1充分条件自动化求解算法 (New Algorithm for Automatic Deriving Sufficient Conditions of SHA-1).
计算机科学, 2016

Construction of Extended Multivariate Public Key Cryptosystems.
Int. J. Netw. Secur., 2016

Accountable Ciphertext-Policy Attribute-Based Encryption Scheme Supporting Public Verifiability and Nonrepudiation.
Proceedings of the Provable Security, 2016

2015
Ticket-Based Authentication for Fast Handover in Wireless Mesh Networks.
Wirel. Pers. Commun., 2015

基于身份的跨信任域签密方案 (Identity-based Signcryption Cross Autonomous Domains).
计算机科学, 2015

缩减轮数Crypton算法中间相遇攻击的改进 (Improved Meet-in-the-middle Attack on Reduced-round Crypton Cipher).
计算机科学, 2015

A Novel ID-based Multi-domain Handover Protocol for Mesh Points in WMNs.
KSII Trans. Internet Inf. Syst., 2015

Trace self-orthogonal relations of normal bases.
Finite Fields Their Appl., 2015

Information diffusion network inferring and pathway tracking.
Sci. China Inf. Sci., 2015

Survey on cyberspace security.
Sci. China Inf. Sci., 2015

Classification of disturbance vectors for collision attack in SHA-1.
Sci. China Inf. Sci., 2015

2014
Symbolic Execution of Network Software Based on Unit Testing.
Proceedings of the 9th IEEE International Conference on Networking, 2014

2013
The Improved Cube Attack on Grain-v1.
IACR Cryptol. ePrint Arch., 2013

SECloud: Binary Analyzing Using Symbolic Execution in the Cloud.
Proceedings of the International Conference on Advanced Cloud and Big Data, 2013

2011
Efficient Certificateless Signcryption Scheme from Weil Pairing.
J. Networks, 2011

2010
Provable secure identity based generalized signcryption scheme.
Theor. Comput. Sci., 2010

Certificateless generalized signcryption.
IACR Cryptol. ePrint Arch., 2010

2009
Research on Trust Evaluation Model Based on TPM.
Proceedings of the Fourth International Conference on Frontier of Computer Science and Technology, 2009

Word Oriented Cascade Jump sigma-LFSR.
Proceedings of the Applied Algebra, 2009

2008
New construction of Boolean functions with maximun algebraic immunity.
IACR Cryptol. ePrint Arch., 2008

Reducible Polynomial over F<sub>2</sub> Constructed by Trinomial sigma-LFSR.
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008

2007
High Efficiency Feedback Shift Register: sigma-LFSR.
IACR Cryptol. ePrint Arch., 2007

Primitive normal polynomials with the first two coefficients prescribed: A revised p-adic method.
Finite Fields Their Appl., 2007

Primitive normal polynomials with multiple coefficients prescribed: An asymptotic result.
Finite Fields Their Appl., 2007

A trinomial type of σ-LFSR oriented toward software implementation.
Sci. China Ser. F Inf. Sci., 2007

2006
Nonexistence of a Kind of Generalized Perfect Binary Array.
Proceedings of the Sequences and Their Applications, 2006

2005
A New Scheme for Key Management in Ad Hoc Networks.
Proceedings of the Networking, 2005

2004
Primitive polynomial with three coefficients prescribed.
Finite Fields Their Appl., 2004

Character sums over Galois rings and primitive polynomials over finite fields.
Finite Fields Their Appl., 2004

Primitive Polynomials over Finite Fields of Characteristic Two.
Appl. Algebra Eng. Commun. Comput., 2004

2003
Random properties of the highest level sequences of primitive sequences over Z(2<sup>e</sup>).
IEEE Trans. Inf. Theory, 2003


  Loading...