Wenfang Zhang

Orcid: 0000-0003-4211-0438

According to our database1, Wenfang Zhang authored at least 21 papers between 2006 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Security Enhanced Authentication Protocol for Space-Ground Integrated Railway Networks.
IEEE Trans. Intell. Transp. Syst., January, 2024

2023
Efficient multiparty quantum private comparison protocol based on single photons and rotation encryption.
Quantum Inf. Process., July, 2023

Security analysis and improvement of a public auditing scheme for secure data storage in fog-to-cloud computing.
Comput. Secur., 2023

2022
Improving the Security of LTE-R for High-Speed Railway: From the Access Authentication View.
IEEE Trans. Intell. Transp. Syst., 2022

A Robust 3-D Medical Watermarking Based on Wavelet Transform for Data Protection.
Comput. Syst. Sci. Eng., 2022

2021
Efficient Privacy-Preserving Authentication Scheme With Fine-Grained Error Location for Cloud-Based VANET.
IEEE Trans. Veh. Technol., 2021

2020
Online Portfolio Selection with Cardinality Constraint and Transaction Costs based on Contextual Bandit.
Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence, 2020

2019
A pairing-free identity-based handover AKE protocol with anonymity in the heterogeneous wireless networks.
Int. J. Commun. Syst., 2019

Transient Fault Diagnosis of Track Circuit Based on MFCC-DTW.
Proceedings of the CAA Symposium on Fault Detection, 2019

2018
A Lightweight Authenticated Encryption Scheme Based on Chaotic SCML for Railway Cloud Service.
IEEE Access, 2018

2015
A virtual bridge certificate authority-based cross-domain authentication mechanism for distributed collaborative manufacturing systems.
Secur. Commun. Networks, 2015

2014
A lightweight blockcipher based on chaotic maps.
Proceedings of the 2014 International Symposium on Biometrics and Security Technologies, 2014

A Robust Collaborative Threshold Authenticated Encryption Scheme Based on Message Blocking.
Proceedings of the 2014 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2014

2013
Cryptanalysis and improvement on a parallel keyed hash function based on chaotic neural network.
Telecommun. Syst., 2013

Secure chaotic system with application to chaotic ciphers.
Inf. Sci., 2013

2012
Dynamic modeling and multivariable control of organic Rankine cycles in waste heat utilizing processes.
Comput. Math. Appl., 2012

2011
Chaotic Hash Function Based on Tandem-DM Construction.
Proceedings of the IEEE 10th International Conference on Trust, 2011

Controller Design for a Heat Exchanger in Waste Heat Utilizing Systems.
Proceedings of the Advances in Swarm Intelligence - Second International Conference, 2011

2008
An Efficient and Secure Biometric Remote User Authentication Scheme Using Smart Cards.
Proceedings of the PACIIA 2008, 2008

2007
Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards.
Comput. Stand. Interfaces, 2007

2006
Chaotic Keystream Generator Using Coupled NDFs with Parameter Perturbing.
Proceedings of the Cryptology and Network Security, 5th International Conference, 2006


  Loading...