Xu An Wang

According to our database1, Xu An Wang authored at least 161 papers between 2007 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Improved secure fuzzy auditing protocol for cloud data storage.
Soft Comput., 2019

Energy-efficient secure outsourcing decryption of attribute based encryption for mobile device in cloud computation.
J. Ambient Intelligence and Humanized Computing, 2019

Cryptanalysis of a public authentication protocol for outsourced databases with multi-user modification.
Inf. Sci., 2019

2018
A privacy-preserving fuzzy interest matching protocol for friends finding in social networks.
Soft Comput., 2018

Secure Testing for Genetic Diseases on Encrypted Genomes with Homomorphic Encryption Scheme.
Security and Communication Networks, 2018

Privacy-Preserving Hybrid K-Means.
IJDWM, 2018

PRE+: dual of proxy re-encryption for secure cloud data sharing service.
IJWGS, 2018

Fast elliptic curve algorithm using deformed Fibonacci-type series.
IJES, 2018

TERS: a traffic efficient repair scheme for repairing multiple losses in erasure-coded distributed storage systems.
IJCSE, 2018

Fast elliptic curve scalar multiplication for resisting against SPA.
IJCSE, 2018

Improved outsourced private set intersection protocol based on polynomial interpolation.
Concurrency and Computation: Practice and Experience, 2018

Improved group-oriented proofs of cloud storage in IoT setting.
Concurrency and Computation: Practice and Experience, 2018

Improved functional proxy re-encryption schemes for secure cloud data sharing.
Comput. Sci. Inf. Syst., 2018

Privacy-Preserving All Convolutional Net Based on Homomorphic Encryption.
Proceedings of the Advances in Network-Based Information Systems, 2018

Improved Functional Encryption Schemes by Using Novel Techniques.
Proceedings of the Advances in Intelligent Networking and Collaborative Systems, 2018

Improved Provable Data Transfer from Provable Data Possession and Deletion in Cloud Storage.
Proceedings of the Advances in Intelligent Networking and Collaborative Systems, 2018

The CP-ABE with Full Verifiability Outsourced Decryption and White-Box Traceability.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

Threshold Model Based on Relative Influence Weight of User.
Proceedings of the Advances in Internet, 2018

Publicly Verifiable 1-norm and 2-norm Operations over Outsourced Data Stream Under Single-Key Setting.
Proceedings of the Advances in Internet, 2018

Verifiable Outsourced Attribute Based Encryption Scheme with Fixed Key Size.
Proceedings of the Advances in Internet, 2018

Phishing Detection Research Based on PSO-BP Neural Network.
Proceedings of the Advances in Internet, 2018

Homomorphic Authentication Based on Rank-Based Merkle Hash Tree.
Proceedings of the Advances in Internet, 2018

An Improved Method for Voiceprint Recognition.
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2018

Combining Vector Space Features and Convolution Neural Network for Text Sentiment Analysis.
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2018

Improved Cooperative Spectrum Sensing Algorithm with Artificial Neural Network.
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2018

Coupling Relationship Construction of Key Elements in Emergency Intelligence with Big Data.
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2018

Network Malicious Behavior Detection Using Bidirectional LSTM.
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2018

More Secure Outsource Protocol for Matrix Multiplication in Cloud Computing.
Proceedings of the Advances on P2P, 2018

On the Security of a CCA-Secure Timed-Release Conditional Proxy Broadcast Re-encryption Scheme.
Proceedings of the Advances on P2P, 2018

Outsourcing Online/offline Proxy Re-encryption for Mobile Cloud Storage Sharing.
Proceedings of the Advances on P2P, 2018

Mining and Utilizing Network Protocol's Stealth Attack Behaviors.
Proceedings of the Advances on P2P, 2018

2017
VCSE: Verifiable conjunctive keywords search over encrypted data without secure-channel.
Peer-to-Peer Networking and Applications, 2017

Reusable garbled gates for new fully homomorphic encryption service.
IJWGS, 2017

New efficient chosen ciphertext secure Elgamal encryption schemes for secure Cloud storage service.
IJWGS, 2017

An Insider Threat Detection Method Based on Business Process Mining.
IJBDCN, 2017

Cost-effective secure E-health cloud system using identity based cryptographic techniques.
Future Generation Comp. Syst., 2017

An efficient and practical threshold gateway-oriented password-authenticated key exchange protocol in the standard model.
SCIENCE CHINA Information Sciences, 2017

Improved Online/Offline Attribute Based Encryption and More.
Proceedings of the Advances in Internetworking, 2017

On the Security of a Cloud Data Storage Auditing Protocol IPAD.
Proceedings of the Advances in Internetworking, 2017

Cyber-Attack Risks Analysis Based on Attack-Defense Trees.
Proceedings of the Advances in Internetworking, 2017

Outsourcing the Decryption of Ciphertexts for Predicate Encryption via Pallier Paradigm.
Proceedings of the Advances in Internetworking, 2017

Key Encapsulation Mechanism from Multilinear Maps.
Proceedings of the Advances in Internetworking, 2017

Improved Ant Colony RBF Spatial Interpolation of Ore Body Visualization Software Development.
Proceedings of the Advances on P2P, 2017

RBF Model Based on the KECDBN.
Proceedings of the Advances on P2P, 2017

2016
m2-ABKS: Attribute-Based Multi-Keyword Search over Encrypted Personal Health Records in Multi-Owner Setting.
J. Medical Systems, 2016

Unidirectional IBPRE scheme from lattice for cloud computation.
J. Ambient Intelligence and Humanized Computing, 2016

A Novel Video Steganography Algorithm Based on Trailing Coecients for H.264/AVC.
Informatica (Slovenia), 2016

D-S Evidence Theory Based Trust Detection Scheme in Wireless Sensor Networks.
IJTHI, 2016

Security Analysis of Cipher ICEBERG against Bit-pattern Based Integral Attack.
IJTHI, 2016

An Improved Security 3D Watermarking Method Using Computational Integral Imaging Cryptosystem.
IJTHI, 2016

Efficient expanded mixed finite element method for the quasilinear elliptic problems.
IJHPSA, 2016

A public cloud storage auditing scheme for resource-constrained clients.
IJHPSA, 2016

Round-optimal ID-based dynamic authenticated group key agreement.
IJHPSA, 2016

Efficient privacy preserving predicate encryption with fine-grained searchable capability for Cloud storage.
Computers & Electrical Engineering, 2016

Some Practical Properties of AP14.
Proceedings of the 2016 International Conference on Intelligent Networking and Collaborative Systems, 2016

A Novel QoS-Aware Load Balancing Mechanism in Cloud Environment.
Proceedings of the 2016 International Conference on Intelligent Networking and Collaborative Systems, 2016

The Research of Enhancing the Dependability of Cloud Services Using Self-Healing Mechanism.
Proceedings of the 2016 International Conference on Intelligent Networking and Collaborative Systems, 2016

Research on Failure Prognostics Method of Electronic System Based on Improved Fruit Fly Algorithm and Grey Fast Relevance Vector Machine.
Proceedings of the 2016 International Conference on Intelligent Networking and Collaborative Systems, 2016

An Optimization Research on the Alternate Interval for Electronic Products.
Proceedings of the 2016 International Conference on Intelligent Networking and Collaborative Systems, 2016

New Differential Fault Attack on Lightweight Cipher LBlock.
Proceedings of the 2016 International Conference on Intelligent Networking and Collaborative Systems, 2016

Identity Based Proxy Re-Encryption Scheme (IBPRE+) for Secure Cloud Data Sharing.
Proceedings of the 2016 International Conference on Intelligent Networking and Collaborative Systems, 2016

Non-transferable Unidirectional Proxy Re-Encryption Scheme for Secure Social Cloud Storage Sharing.
Proceedings of the 2016 International Conference on Intelligent Networking and Collaborative Systems, 2016

Intelligent SMS Spam Filtering Using Topic Model.
Proceedings of the 2016 International Conference on Intelligent Networking and Collaborative Systems, 2016

Intrusion Detection Techniques Based on Cutting-Based Real-Valued Negative Selection.
Proceedings of the 2016 International Conference on Intelligent Networking and Collaborative Systems, 2016

A Novel Multi-class Classification Approach Based on Fruit Fly Optimization Algorithm and Relevance Vector Machine.
Proceedings of the 2016 International Conference on Intelligent Networking and Collaborative Systems, 2016

A Rational Secret Sharing Relying on Reputation.
Proceedings of the 2016 International Conference on Intelligent Networking and Collaborative Systems, 2016

Bayesian Parameter Estimation of Weibull Mixtures Using Cuckoo Search.
Proceedings of the 2016 International Conference on Intelligent Networking and Collaborative Systems, 2016

Design and Implementation of Library Books Search and Management System Using RFID Technology.
Proceedings of the 2016 International Conference on Intelligent Networking and Collaborative Systems, 2016

Locality-Aware and Energy-Aware Job Pre-Assignment for Mapreduce.
Proceedings of the 2016 International Conference on Intelligent Networking and Collaborative Systems, 2016

A Multi-replica Associated Deleting Scheme in Cloud.
Proceedings of the 10th International Conference on Complex, 2016

An ID-based Dynamic Authenticated Group Key Agreement Scheme with Optimal Round Complexity from Pairings.
Proceedings of the 10th International Conference on Complex, 2016

Hybrid Analysis for Mining Network Protocol's Hidden Behavior.
Proceedings of the 10th International Conference on Complex, 2016

Intelligent Management System for Small Gardens Based on Wireless Sensor Network.
Proceedings of the Advances on P2P, 2016

Asymmetric Searchable Encryption from Inner Product Encryption.
Proceedings of the Advances on P2P, 2016

Toward Construction of Encryption with Decryption Awareness Ability for Cloud Storage.
Proceedings of the Advances on P2P, 2016

Toward Construction of Efficient Privacy Preserving Reusable Garbled Circuits.
Proceedings of the Advances on P2P, 2016

A Study of the Internet Financial Interest Rate Risk Evaluation Index System in Context of Cloud Computing.
Proceedings of the Advances on P2P, 2016

Research on Decisive Mechanism of Internet Financial Interest Rate.
Proceedings of the Advances on P2P, 2016

An AHP Based Study of Coal-Mine Zero Harm Safety Culture Evaluation.
Proceedings of the Advances on P2P, 2016

Intrusion Detection for WSN Based on Kernel Fisher Discriminant and SVM.
Proceedings of the Advances on P2P, 2016

Queuing-Oriented Job Optimizing Scheduling In Cloud Mapreduce.
Proceedings of the Advances on P2P, 2016

2015
Security Analysis of Two Identity Based Proxy Re-encryption Schemes in Multi-user Networks.
Trans. Computational Collective Intelligence, 2015

Eroca: A Framework for Efficiently Recovering Outsourced Ciphertexts for Autonomous Vehicles.
Trans. Computational Collective Intelligence, 2015

New Construction of PVPKE Scheme and Its Application in Information Systems and Mobile Communication.
Mobile Information Systems, 2015

Comprehensive Improved Simulated Annealing Optimization for Floorplanning of Heterogeneous 3D Networks-on-Chip.
Journal of Interconnection Networks, 2015

Guest Editor's Foreword.
Journal of Interconnection Networks, 2015

Lattice-based Dynamical and Anonymous Broadcast Encryption Scheme for Wireless Ad Hoc Networks.
Journal of Interconnection Networks, 2015

FE-brick: Re-definition and Re-design of FE Model in Next-Generation Router Architecture.
Journal of Interconnection Networks, 2015

A new proxy re-encryption scheme for protecting critical information systems.
J. Ambient Intelligence and Humanized Computing, 2015

A Study on Components and Features in Face Detection.
IJITWE, 2015

A High-Capacity Covering Code for Voice-Over-IP Steganography.
IJITWE, 2015

Method for Improving Data Security in Register Files Based on Multiple Pipeline Restart.
IJITWE, 2015

An Additively Homomorphic Encryption over Large Message Space.
IJITWE, 2015

New signature schemes in the standard model based on publicly verifiable CCA-secure public key encryption.
IJICT, 2015

Data Owner Based Attribute Based Encryption.
Proceedings of the 2015 International Conference on Intelligent Networking and Collaborative Systems, 2015

New Compact CCA Secure Elgamal Scheme in the Random Oracle Model.
Proceedings of the 2015 International Conference on Intelligent Networking and Collaborative Systems, 2015

Efficient Numerical Simulation for the Quasilinear Elliptic Problems.
Proceedings of the 10th International Conference on P2P, 2015

Ring Signature Scheme from Multilinear Maps in the Standard Model.
Proceedings of the 10th International Conference on P2P, 2015

On Cloud Computing Middleware Architecture.
Proceedings of the 10th International Conference on P2P, 2015

Cascade Face Detection Based on Histograms of Oriented Gradients and Support Vector Machine.
Proceedings of the 10th International Conference on P2P, 2015

An Authentication Key Agreement Scheme for Heterogeneous Sensor Network Based on Improved Counting Bloom Filter.
Proceedings of the 10th International Conference on P2P, 2015

Lattice-Based Dynamical and Anonymous Broadcast Encryption Scheme.
Proceedings of the 10th International Conference on P2P, 2015

Outsourcing Decryption of Attribute Based Encryption with Energy Efficiency.
Proceedings of the 10th International Conference on P2P, 2015

Another Look at Ciphertext Updating Algorithms for Cloud Storage.
Proceedings of the 10th International Conference on P2P, 2015

Proxy Re-signature Supporting Conditional Delegation.
Proceedings of the 10th International Conference on P2P, 2015

Research on War Strategy Games on Mobile Phone Based on Cocos2d-JS.
Proceedings of the 10th International Conference on P2P, 2015

A Public Cloud Storage Auditing Scheme with Lightweight Authenticator Generation.
Proceedings of the 10th International Conference on P2P, 2015

An Efficient VoIP Steganography Based on Random Binary Matrix.
Proceedings of the 10th International Conference on P2P, 2015

Deployment Method of Virtual Machine Cluster Based on Energy Minimization and Graph Cuts Theory.
Proceedings of the 10th International Conference on P2P, 2015

Research on Identification and Addressing of the Internet of Things.
Proceedings of the 10th International Conference on P2P, 2015

Research and Implementation on Visual Analysis of Geological Volume.
Proceedings of the 10th International Conference on P2P, 2015

SPA Resistant Scalar Multiplication Based on Addition and Tripling Indistinguishable on Elliptic Curve Cryptosystem.
Proceedings of the 10th International Conference on P2P, 2015

Fast and Secure Elliptic Curve Scalar Multiplication Algorithm Based on a Kind of Deformed Fibonacci-Type Series.
Proceedings of the 10th International Conference on P2P, 2015

Analysis and Improvement of a Verifiable Phrase Search over Encrypted Data in a Single Phrase.
Proceedings of the 10th International Conference on P2P, 2015

Extensional Schemes of Multipartite Non-interactive Key Exchange from Multilinear Maps.
Proceedings of the 10th International Conference on P2P, 2015

Instruction Clustering Analysis for Network Protocol's Abnormal Behavior.
Proceedings of the 10th International Conference on P2P, 2015

Analyze Network Protocol's Hidden Behavior.
Proceedings of the 10th International Conference on P2P, 2015

Software Data Plane and Flow Switching Plane Separation in Next-Generation Router Architecture.
Proceedings of the 10th International Conference on P2P, 2015

Enhanced Reliability Scheduling Method for the Data in Register File.
Proceedings of the 10th International Conference on P2P, 2015

2013
DDos Attack against Proxy in PRE and PRS.
JSW, 2013

CCA Secure Publicly Verifiable Public Key Encryption Without Pairings Nor Random Oracle and Its Applications.
JCP, 2013

Analysis and Improvements of Several (H)IBS/IBSC/PRBE Schemes.
JCP, 2013

Hybrid Proxy Re-encryption Between IBE And CBE.
JCP, 2013

Identity Based Proxy Re-encryption From BB1 IBE.
JCP, 2013

Identity Based Proxy Re-encryption Based on BB2 and SK IBE with the Help of PKG.
JCP, 2013

On the security of two multi-use CCA-secure proxy re-encryption schemes.
IJIIDS, 2013

New Construction of PVPKE Scheme Based on Signed Quadratic Residues.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Yet Another Way to Construct Digital Signature in the Standard Model.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Efficient Predicate Encryption Supporting Construction of Fine-Grained Searchable Encryption.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Fully Secure Attribute-Based Encryption with Non-monotonic Access Structures.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Toward Construction of PVPKE in the Standard Model Based on Factoring Assumption.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

2012
Further observation on proxy re-encryption with keyword search.
Journal of Systems and Software, 2012

Cryptanalysis of a Fuzzy Identity Based Encryption Scheme in the Standard Model.
Informatica, Lith. Acad. Sci., 2012

New Identity Based Encryption And Its Proxy Re-encryption.
IACR Cryptology ePrint Archive, 2012

Security Analysis of a Multi-use Identity Based CCA-Secure Proxy Re-encryption Scheme.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

On the Security of a Multi-use CCA-Secure Proxy Re-encryption Scheme.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

Cryptanalysis and Improvement of an Efficient CCA Secure PKE Scheme.
Proceedings of the Eighth International Conference on Computational Intelligence and Security, 2012

Security Analysis of Several Chosen Ciphertext Secure Group-oriented Encryption Schemes.
Proceedings of the Eighth International Conference on Computational Intelligence and Security, 2012

2011
Cryptanalysis of an (hierarchical) identity based parallel key-insulated encryption scheme.
Journal of Systems and Software, 2011

Cryptanalysis of an identity based broadcast encryption scheme without random oracles.
Inf. Process. Lett., 2011

Cryptanalysis and Improvement of an Efficient CCA Secure PKE Scheme.
IACR Cryptology ePrint Archive, 2011

Cryptanalysis of Two Efficient HIBE Schemes in the Standard Model.
Fundam. Inform., 2011

Proxy Re-encryption with Keyword Search from Anonymous Conditional Proxy Re-encryption.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

K-times Proxy Re-encryption.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

2010
Provable Secure Generalized Signcryption.
JCP, 2010

Cryptanalysis of Two Efficient HIBE Schemes in the Standard Model.
IACR Cryptology ePrint Archive, 2010

On the Insecurity of an Identity Based Proxy Re-encryption Scheme.
Fundam. Inform., 2010

Proxy Re-Encryption Schemes with Proxy Having Its Own Public/Private Keys.
Proceedings of the Second International Workshop on Database Technology and Applications, 2010

Proxy Re-encryption from CLE to CBE.
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010

New CCA-Secure Proxy Re-encryption Scheme without Random Oracles.
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010

2009
Proxy Re-encryption Scheme from IBE to CBE.
Proceedings of the First International Workshop on Database Technology and Applications, 2009

How to Solve Key Escrow Problem in Proxy Re-encryption from CBE to IBE.
Proceedings of the First International Workshop on Database Technology and Applications, 2009

On Security Notions for Verifiably Encrypted Signature.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

Proxy Re-encryption Scheme Based on SK Identity Based Encryption.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

On DDos Attack against Proxy in Proxy Re-encryption and Proxy Re-signature.
Proceedings of the Ninth IEEE International Conference on Computer and Information Technology, 2009

2008
Chosen-Ciphertext Secure Proxy Re-Encryption without Pairings.
IACR Cryptology ePrint Archive, 2008

On the Role of PKG for Proxy Re-encryption in Identity Based Setting.
IACR Cryptology ePrint Archive, 2008

On Security Notions for Verifiable Encrypted Signature.
IACR Cryptology ePrint Archive, 2008

Multi-Recipient Signcryption for Secure Wireless Group Communication.
IACR Cryptology ePrint Archive, 2008

Further Observations on Certificateless Public Key Encryption.
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008

2007
Provable Secure Generalized Signcryption.
IACR Cryptology ePrint Archive, 2007


  Loading...