Volgen
Jing Wang
Titel
Geciteerd door
Geciteerd door
Jaar
Blockchain-based anonymous authentication with key management for smart grid edge computing infrastructure
J Wang, L Wu, KKR Choo, D He
IEEE Transactions on Industrial Informatics 16 (3), 1984-1992, 2019
2482019
Secure key agreement and key protection for mobile device user authentication
L Wu, J Wang, KKR Choo, D He
IEEE Transactions on Information Forensics and Security 14 (2), 319-330, 2018
1422018
An efficient and privacy-preserving outsourced support vector machine training for internet of medical things
J Wang, L Wu, H Wang, KKR Choo, D He
IEEE Internet of Things Journal 8 (1), 458-473, 2020
612020
Privacy-preserving data aggregation against malicious data mining attack for IoT-enabled smart grid
J Wang, L Wu, S Zeadally, MK Khan, D He
ACM Transactions on Sensor Networks (TOSN) 17 (3), 1-25, 2021
472021
Anonymous and efficient message authentication scheme for smart grid
L Wu, J Wang, S Zeadally, D He
Security and Communication Networks 2019, 2019
352019
LSFL: A lightweight and secure federated learning scheme for edge computing
Z Zhang, L Wu, C Ma, J Li, J Wang, Q Wang, S Yu
IEEE Transactions on Information Forensics and Security 18, 365-379, 2022
342022
A secure and efficient multiserver authentication and key agreement protocol for internet of vehicles
J Wang, L Wu, H Wang, KKR Choo, L Wang, D He
IEEE Internet of Things Journal 9 (23), 24398-24416, 2022
312022
White-box implementation of the identity-based signature scheme in the IEEE P1363 standard for public key cryptography
Y Zhang, D He, X Huang, D Wang, KKR Choo, J Wang
IEICE TRANSACTIONS on Information and Systems 103 (2), 188-195, 2020
282020
Pcnncec: Efficient and privacy-preserving convolutional neural network inference based on cloud-edge-client collaboration
J Wang, D He, A Castiglione, BB Gupta, M Karuppiah, L Wu
IEEE Transactions on Network Science and Engineering, 2022
232022
An efficient provably-secure identity-based authentication scheme using bilinear pairings for Ad hoc network
L Wu, J Wang, KKR Choo, Y Li, D He
Journal of information security and applications 37, 112-121, 2017
212017
Secure public data auditing scheme for cloud storage in smart city
L Wu, J Wang, N Kumar, D He
Personal and Ubiquitous Computing 21, 949-962, 2017
162017
Privacy-preserving auditing scheme for shared data in public clouds
L Wu, J Wang, S Zeadally, D He
The Journal of Supercomputing 74, 6156-6183, 2018
152018
Cryptanalysis of an identity-based public auditing protocol for cloud storage
L Wu, J Wang, D He, MK Khan
Frontiers of Information Technology & Electronic Engineering 18 (12), 1972-1977, 2017
92017
Lightweight certificateless privacy-preserving integrity verification with conditional anonymity for cloud-assisted medical cyber–physical systems
J Zhao, Y Zheng, H Huang, J Wang, X Zhang, D He
Journal of Systems Architecture 138, 102860, 2023
62023
安全高效的两方协同 ECDSA 签名方案
王婧, 吴黎兵, 罗敏, 何德彪
通信学报 42 (2), 12-25, 2021
22021
On the Security of a Certificateless Public Verification Scheme for Cloud-Based Cyber-Physical-Social Systems
J Wang, H Zhang, L Shao, L Li, M Luo
Security and Privacy in Social Networks and Big Data: 6th International …, 2020
2020
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–16