huaqun Wang
Titel
Geciteerd door
Geciteerd door
Jaar
Proxy provable data possession in public clouds
H Wang
IEEE Transactions on Services Computing 6 (4), 551-559, 2012
2462012
Identity-based distributed provable data possession in multicloud storage
H Wang
IEEE Transactions on Services Computing 8 (2), 328-340, 2014
2092014
Identity-based proxy-oriented data uploading and remote data integrity checking in public cloud
H Wang, D He, S Tang
IEEE Transactions on Information Forensics and Security 11 (6), 1165-1176, 2016
1112016
Identity-based remote data possession checking in public clouds
H Wang, Q Wu, B Qin, J Domingo-Ferrer
IET Information Security 8 (2), 114-121, 2013
952013
Anonymous and secure aggregation scheme in fog-based public cloud computing
H Wang, Z Wang, J Domingo-Ferrer
Future Generation Computer Systems 78, 712-719, 2018
752018
A provably-secure cross-domain handshake scheme with symptoms-matching for mobile healthcare social network
D He, N Kumar, H Wang, L Wang, KKR Choo, A Vinel
IEEE Transactions on Dependable and Secure Computing 15 (4), 633-645, 2016
732016
Strong key-exposure resilient auditing for secure cloud storage
J Yu, H Wang
IEEE Transactions on Information Forensics and Security 12 (8), 1931-1940, 2017
662017
NPP: a new privacy-aware public auditing scheme for cloud data sharing with group users
A Fu, S Yu, Y Zhang, H Wang, C Huang
IEEE Transactions on Big Data, 2017
632017
Cryptanalysis and improvements of an anonymous multi-receiver identity-based encryption scheme
H Wang, Y Zhang, H Xiong, B Qin
IET Information Security 6 (1), 20-27, 2012
542012
On the knowledge soundness of a cooperative provable data possession scheme in multicloud storage
H Wang, Y Zhang
IEEE Transactions on Parallel and Distributed Systems 25 (1), 264-267, 2013
532013
Lightweight anonymous key distribution scheme for smart grid using elliptic curve cryptography
D He, H Wang, MK Khan, L Wang
IET Communications 10 (14), 1795-1802, 2016
502016
Lightweight anonymous key distribution scheme for smart grid using elliptic curve cryptography
D He, H Wang, MK Khan, L Wang
IET Communications 10 (14), 1795-1802, 2016
502016
TPP: Traceable privacy-preserving communication and precise reward for vehicle-to-grid networks in smart grids
H Wang, B Qin, Q Wu, L Xu, J Domingo-Ferrer
IEEE Transactions on Information Forensics and Security 10 (11), 2340-2351, 2015
502015
FRR: Fair remote retrieval of outsourced private medical records in electronic health networks
H Wang, Q Wu, B Qin, J Domingo-Ferrer
Journal of biomedical informatics 50, 226-233, 2014
432014
Anonymous biometrics-based authentication scheme with key distribution for mobile multi-server environment
Q Feng, D He, S Zeadally, H Wang
Future Generation Computer Systems 84, 239-251, 2018
392018
Incentive and unconditionally anonymous identity-based public provable data possession
H Wang, D He, J Yu, Z Wang
IEEE Transactions on Services Computing, 2016
362016
Privacy-preserving certificateless provable data possession scheme for big data storage on cloud
D He, N Kumar, H Wang, L Wang, KKR Choo
Applied Mathematics and Computation 314, 31-43, 2017
352017
Certificateless provable data possession scheme for cloud-based smart grid data management systems
D He, N Kumar, S Zeadally, H Wang
IEEE Transactions on Industrial Informatics 14 (3), 1232-1241, 2017
342017
Designated-verifier proof of assets for bitcoin exchange using elliptic curve cryptography
H Wang, D He, Y Ji
Future Generation Computer Systems 107, 854-862, 2020
312020
Efficient certificateless anonymous multi-receiver encryption scheme for mobile devices
D He, H Wang, L Wang, J Shen, X Yang
Soft Computing 21 (22), 6801-6810, 2017
272017
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20