Следене
Jing Wang (王婧)
Заглавие
Позовавания
Позовавания
Година
Blockchain-based anonymous authentication with key management for smart grid edge computing infrastructure
J Wang, L Wu, KKR Choo, D He
IEEE Transactions on Industrial Informatics 16 (3), 1984-1992, 2019
2972019
Secure key agreement and key protection for mobile device user authentication
L Wu, J Wang, KKR Choo, D He
IEEE Transactions on Information Forensics and Security 14 (2), 319-330, 2018
1492018
An efficient and privacy-preserving outsourced support vector machine training for internet of medical things
J Wang, L Wu, H Wang, KKR Choo, D He
IEEE Internet of Things Journal 8 (1), 458-473, 2020
752020
LSFL: A lightweight and secure federated learning scheme for edge computing
Z Zhang, L Wu, C Ma, J Li, J Wang, Q Wang, S Yu
IEEE Transactions on Information Forensics and Security 18, 365-379, 2022
652022
Privacy-preserving data aggregation against malicious data mining attack for IoT-enabled smart grid
J Wang, L Wu, S Zeadally, MK Khan, D He
ACM Transactions on Sensor Networks (TOSN) 17 (3), 1-25, 2021
632021
A secure and efficient multiserver authentication and key agreement protocol for internet of vehicles
J Wang, L Wu, H Wang, KKR Choo, L Wang, D He
IEEE Internet of Things Journal 9 (23), 24398-24416, 2022
532022
Anonymous and efficient message authentication scheme for smart grid
L Wu, J Wang, S Zeadally, D He
Security and Communication Networks 2019 (1), 4836016, 2019
372019
PCNNCEC: Efficient and Privacy-Preserving Convolutional Neural Network Inference Based on Cloud-Edge-Client Collaboration
J Wang, D He, A Castiglione, BB Gupta, M Karuppiah, L Wu
IEEE Transactions on Network Science and Engineering 10 (5), 2906-2923, 2022
322022
White-box implementation of the identity-based signature scheme in the IEEE P1363 standard for public key cryptography
Y Zhang, D He, X Huang, D Wang, KKR Choo, J Wang
IEICE TRANSACTIONS on Information and Systems 103 (2), 188-195, 2020
282020
An efficient provably-secure identity-based authentication scheme using bilinear pairings for Ad hoc network
L Wu, J Wang, KKR Choo, Y Li, D He
Journal of information security and applications 37, 112-121, 2017
212017
Privacy-preserving auditing scheme for shared data in public clouds
L Wu, J Wang, S Zeadally, D He
The Journal of Supercomputing 74, 6156-6183, 2018
182018
Secure public data auditing scheme for cloud storage in smart city
L Wu, J Wang, N Kumar, D He
Personal and Ubiquitous Computing 21, 949-962, 2017
162017
Lightweight certificateless privacy-preserving integrity verification with conditional anonymity for cloud-assisted medical cyber–physical systems
J Zhao, Y Zheng, H Huang, J Wang, X Zhang, D He
Journal of Systems Architecture 138, 102860, 2023
132023
Cryptanalysis of an identity-based public auditing protocol for cloud storage
L Wu, J Wang, D He, MK Khan
Frontiers of Information Technology & Electronic Engineering 18 (12), 1972-1977, 2017
82017
Libras: a fair, secure, verifiable and scalable outsourcing computation scheme based on blockchain
L Huo, L Wu, Z Zhang, C Li, D He, J Wang
IEEE Transactions on Information Forensics and Security, 2024
32024
安全高效的两方协同 ECDSA 签名方案
王婧, 吴黎兵, 罗敏, 何德彪
通信学报 42 (2), 12-25, 2021
32021
EPDR: An Efficient and Privacy-Preserving Disease Research System with Horizontal Federated Learning in the Internet of Medical Things
Y Yang, D He, J Wang, Q Feng, M Luo
HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES 14, 2024
2024
An Efficient Multiparty Threshold ECDSA Protocol against Malicious Adversaries for Blockchain‐Based LLMs
J Wang, X Yuan, Y Xu, Y Zhang
IET Information Security 2024 (1), 2252865, 2024
2024
On the Security of a Certificateless Public Verification Scheme for Cloud-Based Cyber-Physical-Social Systems
J Wang, H Zhang, L Shao, L Li, M Luo
Security and Privacy in Social Networks and Big Data: 6th International …, 2020
2020
Системата не може да изпълни операцията сега. Опитайте отново по-късно.
Статии 1–19