Wenzheng Zhang

Orcid: 0009-0002-3888-0229

Affiliations:
  • Science and Technology on Communication Security Laboratory, Chengdu, China


According to our database1, Wenzheng Zhang authored at least 23 papers between 2006 and 2025.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Incentive-assisted multi-keyword ranked searchable encryption with hidden attributes for community data sharing.
Peer Peer Netw. Appl., June, 2025

Efficient Collaborative Data Cleaning Using Private Set Intersection and Encoding for Unbalanced Datasets.
IEEE Trans. Inf. Forensics Secur., 2025

Threshold Password-Hardening Updatable Oblivious Key Management.
IEEE Trans. Inf. Forensics Secur., 2025

Attribute-Based Policy-Hiding Redactable Blockchain With Authorizable Verification for Energy Internet.
IEEE Internet Things J., 2025

2024
A Small-Size FHE Scheme for Better Privacy Protection of IoT.
IEEE Internet Things J., April, 2024

Attribute-Based Hierarchical Keyword Auditing With Batch Fault Localization Assisted by Smart Contracts.
IEEE Trans. Cloud Comput., 2024

2023
An Efficient Identity Authentication Scheme With Dynamic Anonymity for VANETs.
IEEE Internet Things J., June, 2023

ABCrowdMed: A Fine-Grained Worker Selection Scheme for Crowdsourcing Healthcare With Privacy-Preserving.
IEEE Trans. Serv. Comput., 2023

Public-key encryption scheme with optimal continuous leakage resilience.
Inf. Process. Lett., 2023

2022
A distributed privacy-preserving data aggregation scheme for smart grid with fine-grained access control.
J. Inf. Secur. Appl., 2022

Continuous Leakage-Amplified Public-Key Encryption With CCA Security.
Comput. J., 2022

2016
CCA2 secure public-key encryption scheme tolerating continual leakage attacks.
Secur. Commun. Networks, 2016

Provably secure and efficient leakage-resilient certificateless signcryption scheme without bilinear pairing.
Discret. Appl. Math., 2016

2013
Identity-Based Public Verification with Privacy-Preserving for Data Storage Security in Cloud Computing.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013

2011
Multibiometric Based Secure Encryption, Authentication Scheme with Fuzzy Extractor.
Int. J. Netw. Secur., 2011

2010
Fuzzy Biometric Signcryption Scheme with Bilinear Pairings in the Standard Model.
Proceedings of the Intelligence and Security Informatics, Pacific Asia Workshop, 2010

2009
Ordered Semiring-based Trust Establish Model with Risk Evaluating.
Int. J. Netw. Secur., 2009

Analysis and Improvement of an ID-Based Anonymous Signcryption Model.
Proceedings of the Emerging Intelligent Computing Technology and Applications, 2009

2008
Efficient Secret Authenticatable Anonymous Signcryption Scheme with Identity Privacy.
Proceedings of the Intelligence and Security Informatics, 2008

Assertions Signcryption Scheme in Decentralized Autonomous Trust Environments.
Proceedings of the Autonomic and Trusted Computing, 5th International Conference, 2008

2007
Using Trust Metric to Detect Malicious Behaviors in WSNs.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

Trust-based Distributed Authentication Middleware in Ubiquitous Mobile Environments.
Proceedings of the Third International Conference on Natural Computation, 2007

2006
An Efficient Anonymous Fingerprinting Protocol.
Proceedings of the Computational Intelligence and Security, International Conference, 2006


  Loading...