Zhiguo Wan

According to our database1, Zhiguo Wan authored at least 46 papers between 2004 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
MicroBTC: Efficient, Flexible and Fair Micropayment for Bitcoin Using Hash Chains.
J. Comput. Sci. Technol., 2019

2018
VPSearch: Achieving Verifiability for Privacy-Preserving Multi-Keyword Search over Encrypted Cloud Data.
IEEE Trans. Dependable Sec. Comput., 2018

Efficient and Expressive Keyword Search Over Encrypted Data in Cloud.
IEEE Trans. Dependable Sec. Comput., 2018

A Blockchain-Based Privacy-Preserving Payment Mechanism for Vehicle-to-Grid Networks.
IEEE Network, 2018

PRIDE: A Private and Decentralized Usage-Based Insurance Using Blockchain.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018

Secure Fair and Efficient Data Trading Without Third Party Using Blockchain.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018

A Novel Graph-based Mechanism for Identifying Traffic Vulnerabilities in Smart Home IoT.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

2017
Verifiable and Exculpable Outsourced Attribute-Based Encryption for Access Control in Cloud Computing.
IEEE Trans. Dependable Sec. Comput., 2017

BKI: Towards Accountable and Decentralized Public-Key Infrastructure with Blockchain.
Proceedings of the Security and Privacy in Communication Networks, 2017

2016
Rebuttal to "Comments on 'Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption"'.
IEEE Trans. Information Forensics and Security, 2016

PRAC: Efficient privacy protection for vehicle-to-grid communications in the smart grid.
Computers & Security, 2016

2015
Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption.
IEEE Trans. Information Forensics and Security, 2015

Electronic Contract Signing Without Using Trusted Third Party.
Proceedings of the Network and System Security - 9th International Conference, 2015

2014
SKM: Scalable Key Management for Advanced Metering Infrastructure in Smart Grids.
IEEE Trans. Industrial Electronics, 2014

From least interference-cost paths to maximum (Concurrent) multiflow in MC-MR wireless networks.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

2013
A Collusion-Resistant Conditional Access System for Flexible-Pay-Per-Channel Pay-TV Broadcasting.
IEEE Trans. Multimedia, 2013

Achieving Revocable Fine-Grained Cryptographic Access Control over Cloud Data.
Proceedings of the Information Security, 16th International Conference, 2013

Mutual privacy-preserving regression modeling in participatory sensing.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Stability analyses of static greedy link schedulings in MC-MR wireless networks.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Scalable algorithms for wireless link schedulings in multi-channel multi-radio wireless networks.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Privacy preserving cloud data access with multi-authorities.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

2012
USOR: An Unobservable Secure On-Demand Routing Protocol for Mobile Ad Hoc Networks.
IEEE Trans. Wireless Communications, 2012

HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing.
IEEE Trans. Information Forensics and Security, 2012

Stability analyses of longest-queue-first link scheduling in MC-MR wireless networks.
Proceedings of the Thirteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2012

Priv-Code: Preserving privacy against traffic analysis through network coding for multihop wireless networks.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

2011
Hierarchical Attribute-Set Based Encryption for Scalable, Flexible and Fine-Grained Access Control in Cloud Computing.
Proceedings of the Information Security Practice and Experience, 2011

De-Anonymizing Dynamic Social Networks.
Proceedings of the Global Communications Conference, 2011

2010
Assure High Quality Code Using Refactoring and Obfuscation Techniques.
Proceedings of the Fifth International Conference on Frontier of Computer Science and Technology, 2010

A Brief Survey on De-anonymization Attacks in Online Social Networks.
Proceedings of the International Conference on Computational Aspects of Social Networks, 2010

2009
n PAKE+: A Tree-Based Group Password-Authenticated Key Exchange Protocol Using Different Passwords.
J. Comput. Sci. Technol., 2009

CLEAR: A confidential and Lifetime-Aware Routing Protocol for wireless sensor network.
Proceedings of the IEEE 20th International Symposium on Personal, 2009

Enhanced Location Privacy Protection of Base Station in Wireless Sensor Networks.
Proceedings of the MSN 2009, 2009

Privacy-Aware Attribute-Based Encryption with User Accountability.
Proceedings of the Information Security, 12th International Conference, 2009

Anonymous user communication for privacy protection in wireless metropolitan mesh networks.
Proceedings of the 2009 ACM Symposium on Information, 2009

2008
A secure privacy-preserving roaming protocol based on hierarchical identity-based encryption for mobile networks.
Proceedings of the First ACM Conference on Wireless Network Security, 2008

Anonymous ID-Based Group Key Agreement for Wireless Networks.
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008

2007
Access control protocols with two-layer architecture for wireless networks.
Computer Networks, 2007

n PAKE + : A Hierarchical Group Password-Authenticated Key Exchange Protocol Using Different Passwords.
Proceedings of the Information and Communications Security, 9th International Conference, 2007

2006
Security analysis on a conference scheme for mobile communications.
IEEE Trans. Wireless Communications, 2006

Efficient key tree construction for group key agreement in ad hoc networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2006

2005
DoS-resistant access control protocol with identity confidentiality for wireless networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2005

Anonymous DoS-Resistant Access Control Protocol Using Passwords for Wireless Networks.
Proceedings of the 30th Annual IEEE Conference on Local Computer Networks (LCN 2005), 2005

Providing efficient certification services against active attacks in ad hoc networks.
Proceedings of the 24th IEEE International Performance Computing and Communications Conference, 2005

2004
Highly reliable trust establishment scheme in ad hoc networks.
Computer Networks, 2004

Anonymous Secure Routing in Mobile Ad-Hoc Networks.
Proceedings of the 29th Annual IEEE Conference on Local Computer Networks (LCN 2004), 2004

Cryptanalysis of Two Password-Authenticated Key Exchange Protocols.
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004


  Loading...