Wenzheng Zhang
Orcid: 0009-0002-3888-0229Affiliations:
- Science and Technology on Communication Security Laboratory, Chengdu, China
According to our database1,
Wenzheng Zhang
authored at least 23 papers
between 2006 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
Incentive-assisted multi-keyword ranked searchable encryption with hidden attributes for community data sharing.
Peer Peer Netw. Appl., June, 2025
Efficient Collaborative Data Cleaning Using Private Set Intersection and Encoding for Unbalanced Datasets.
IEEE Trans. Inf. Forensics Secur., 2025
IEEE Trans. Inf. Forensics Secur., 2025
Attribute-Based Policy-Hiding Redactable Blockchain With Authorizable Verification for Energy Internet.
IEEE Internet Things J., 2025
2024
IEEE Internet Things J., April, 2024
Attribute-Based Hierarchical Keyword Auditing With Batch Fault Localization Assisted by Smart Contracts.
IEEE Trans. Cloud Comput., 2024
2023
IEEE Internet Things J., June, 2023
ABCrowdMed: A Fine-Grained Worker Selection Scheme for Crowdsourcing Healthcare With Privacy-Preserving.
IEEE Trans. Serv. Comput., 2023
Inf. Process. Lett., 2023
2022
A distributed privacy-preserving data aggregation scheme for smart grid with fine-grained access control.
J. Inf. Secur. Appl., 2022
Comput. J., 2022
2016
Secur. Commun. Networks, 2016
Provably secure and efficient leakage-resilient certificateless signcryption scheme without bilinear pairing.
Discret. Appl. Math., 2016
2013
Identity-Based Public Verification with Privacy-Preserving for Data Storage Security in Cloud Computing.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013
2011
Int. J. Netw. Secur., 2011
2010
Proceedings of the Intelligence and Security Informatics, Pacific Asia Workshop, 2010
2009
Int. J. Netw. Secur., 2009
Proceedings of the Emerging Intelligent Computing Technology and Applications, 2009
2008
Efficient Secret Authenticatable Anonymous Signcryption Scheme with Identity Privacy.
Proceedings of the Intelligence and Security Informatics, 2008
Proceedings of the Autonomic and Trusted Computing, 5th International Conference, 2008
2007
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007
Proceedings of the Third International Conference on Natural Computation, 2007
2006
Proceedings of the Computational Intelligence and Security, International Conference, 2006