مقالات بحثية تمّ التفويض بإتاحتها للجميع - Huaxiong Wangمزيد من المعلومات
عدد المقالات البحثية غير المتاحة للجميع في أي موقع: 11
Identity-based key-exposure resilient cloud storage public auditing scheme from lattices
X Zhang, H Wang, C Xu
Information Sciences 472, 223-234, 2019
التفويضات: National Natural Science Foundation of China
Key-Leakage Resilient Encrypted Data Aggregation With Lightweight Verification in Fog-Assisted Smart Grids
X Zhang, C Huang, C Xu, Y Zhang, J Zhang, H Wang
IEEE Internet of Things Journal 8 (10), 8234-8245, 2020
التفويضات: National Natural Science Foundation of China
Communication Efficient Secret Sharing with Small Share Size
J Ding, C Lin, H Wang, C Xing
IEEE Transactions on Information Theory, 2022
التفويضات: National Natural Science Foundation of China
BIB-MKS: Post-Quantum Secure Biometric Identity-Based Multi-Keyword Search over Encrypted Data in Cloud Storage Systems
X Zhang, C Huang, D Gu, J Zhang, H Wang
IEEE Transactions on Services Computing, 2021
التفويضات: National Natural Science Foundation of China
Verifiable inner product computation on outsourced database for authenticated multi-user data sharing
H Yang, Y Su, J Qin, H Wang, Y Song
Information Sciences 539, 295-311, 2020
التفويضات: National Natural Science Foundation of China, A*Star, Singapore
Spatial encryption supporting non-monotone access structure
J Chen, HW Lim, S Ling, L Su, H Wang
Designs, codes and cryptography 73 (3), 731-746, 2014
التفويضات: National Research Foundation, Singapore
A provable data possession scheme with data hierarchy in cloud
C Lin, F Luo, H Wang, Y Zhu
International Conference on Information Security and Cryptology, 301-321, 2015
التفويضات: National Natural Science Foundation of China
Zero-Knowledge Proofs for Committed Symmetric Boolean Functions
S Ling, K Nguyen, DH Phan, H Tang, H Wang
International Conference on Post-Quantum Cryptography, 339-359, 2021
التفويضات: A*Star, Singapore, Agence Nationale de la Recherche
An Efficient Public Batch Auditing Scheme for Data Integrity in Standard Model
H Yang, Y Su, J Qin, J Ma, H Wang
International Conference on Machine Learning for Cyber Security, 578-592, 2020
التفويضات: National Natural Science Foundation of China
Binary de Bruijn Sequences via Zech’s Logarithms
Z Chang, MF Ezerman, AA Fahreza, S Ling, J Szmidt, H Wang
SN Computer Science 2 (4), 1-18, 2021
التفويضات: National Natural Science Foundation of China
Cloud-Aided Privacy Preserving User Authentication and Key Agreement Protocol for Internet of Things
C Wang, D Wang, H Wang, G Xu, J Sun, H Wang
International Symposium on Security and Privacy in Social Networks and Big …, 2019
التفويضات: National Natural Science Foundation of China
عدد المقالات البحثية المتاحة للجميع في موقع ما: 52
Improved zero-knowledge proofs of knowledge for the ISIS problem, and applications
S Ling, K Nguyen, D Stehlé, H Wang
International workshop on public key cryptography, 107-124, 2013
التفويضات: Australian Research Council
Lattice-based group signature scheme with verifier-local revocation
A Langlois, S Ling, K Nguyen, H Wang
International workshop on public key cryptography, 345-361, 2014
التفويضات: European Commission
Understanding node capture attacks in user authentication schemes for wireless sensor networks
C Wang, D Wang, Y Tu, G Xu, H Wang
IEEE Transactions on Dependable and Secure Computing, 2020
التفويضات: National Natural Science Foundation of China
FS-PEKS: Lattice-based forward secure public-key encryption with keyword search for cloud-assisted industrial Internet of Things
X Zhang, C Xu, H Wang, Y Zhang, S Wang
IEEE Transactions on Dependable and Secure Computing, 2019
التفويضات: National Natural Science Foundation of China, National Research Foundation …
A blockchain-based application system for product anti-counterfeiting
J Ma, SY Lin, X Chen, HM Sun, YC Chen, H Wang
IEEE Access 8, 77642-77652, 2020
التفويضات: National Natural Science Foundation of China
Lattice-based proxy-oriented identity-based encryption with keyword search for cloud storage
X Zhang, Y Tang, H Wang, C Xu, Y Miao, H Cheng
Information Sciences 494, 193-207, 2019
التفويضات: National Natural Science Foundation of China
CIPPPA: Conditional identity privacy-preserving public auditing for cloud-based WBANs against malicious auditors
X Zhang, J Zhao, C Xu, H Li, H Wang, Y Zhang
IEEE Transactions on Cloud Computing, 2019
التفويضات: National Natural Science Foundation of China, National Research Foundation …
Efficient private comparison queries over encrypted databases using fully homomorphic encryption with finite fields
BHM Tan, HT Lee, H Wang, SQ Ren, AMM Khin
IEEE Transactions on Dependable and Secure Computing, 2020
التفويضات: A*Star, Singapore, National Research Foundation, Singapore
A provable authenticated group key agreement protocol for mobile environment
HM Sun, BZ He, CM Chen, TY Wu, CH Lin, H Wang
Information Sciences 321, 224-237, 2015
التفويضات: National Natural Science Foundation of China
يتم تحديد معلومات التمويل والنشر من خلال برنامج كمبيوتر تلقائيًا.