Folgen
Haiyan Wang(王海燕)
Haiyan Wang(王海燕)
Pengcheng Laboratory
Bestätigte E-Mail-Adresse bei pcl.ac.cn
Titel
Zitiert von
Zitiert von
Jahr
A fast CP-ABE system for cyber-physical security and privacy in mobile healthcare network
S Wang, H Wang, J Li, H Wang, J Chaudhry, M Alazab, H Song
IEEE Transactions on Industry Applications 56 (4), 4467-4477, 2020
1002020
An efficient attribute-based encryption scheme with policy update and file update in cloud computing
J Li, S Wang, Y Li, H Wang, H Wang, H Wang, J Chen, Z You
IEEE Transactions on Industrial Informatics 15 (12), 6500-6509, 2019
902019
A fast and flexible attribute-based searchable encryption scheme supporting multi-search mechanism in cloud computing
H Wang, Y Li, W Susilo, DH Duong, F Luo
Computer Standards & Interfaces 82, 103635, 2022
272022
An efficient ciphertext-policy attribute-based encryption scheme supporting collaborative decryption with blockchain
Y He, H Wang, Y Li, K Huang, VCM Leung, FR Yu, Z Ming
IEEE Internet of Things Journal 9 (4), 2722-2733, 2021
212021
Revocable attribute-based encryption from standard lattices
F Luo, S Al-Kuwari, H Wang, F Wang, K Chen
Computer Standards & Interfaces 84, 103698, 2023
112023
Linearization of multi-valued nonlinear feedback shift registers
H Wang, J Zhong, D Lin
Journal of Systems Science and Complexity 30 (2), 494-509, 2017
102017
Attribute-based searchable encryption scheme supporting efficient range search in cloud computing
Y Li, H Wang, S Wang, Y Ding
2021 IEEE Conference on Dependable and Secure Computing (DSC), 1-8, 2021
82021
Public trace-and-revoke proxy re-encryption for secure data sharing in clouds
F Luo, H Wang, W Susilo, X Yan, X Zheng
IEEE Transactions on Information Forensics and Security, 2024
42024
Abaeks: Attribute-based authenticated encryption with keyword search over outsourced encrypted data
F Luo, H Wang, C Lin, X Yan
IEEE Transactions on Information Forensics and Security, 2023
42023
Multi-key fully homomorphic encryption without CRS from RLWE
F Luo, H Wang, AK Saif, W Han
Computer Standards & Interfaces 86, 103742, 2023
32023
Generic construction of trace-and-revoke inner product functional encryption
F Luo, S Al-Kuwari, H Wang, W Han
European Symposium on Research in Computer Security, 259-282, 2022
32022
Attribute-based weighted keyword search scheme supporting multi-search mechanism in fog computing
S Wang, Y Li, H Wang, X Zhang, J Chen
2020 7th IEEE International Conference on Cyber Security and Cloud Computing …, 2020
32020
On Stability of Multi‐Valued Nonlinear Feedback Shift Registers
H Wang, Q Lin, J Chen, J Li, J Zhong, D Lin, J Wang, L Ma
Complexity 2019 (1), 8765970, 2019
22019
The generating set of the differential invariant algebra and Maurer-Cartan equations of a (2+ 1)-dimensional burgers equation
J Mei, H Wang
Journal of Systems Science and Complexity 26 (2), 281-290, 2013
22013
Re-PAEKS: Public-key Authenticated Re-Encryption with Keyword Search
F Luo, H Wang, X Yan
IEEE Transactions on Mobile Computing, 2024
12024
Fully collusion resistant trace-and-revoke functional encryption for arbitrary identities
F Luo, S Al-Kuwari, H Wang, X Yan
Theoretical Computer Science 987, 114368, 2024
12024
Comments on “VERSA: Verifiable Secure Aggregation for Cross-Device Federated Learning”
F Luo, H Wang, X Yan
IEEE Transactions on Dependable and Secure Computing 21 (1), 499-500, 2023
12023
A Password-Based Access Control Framework for Time-Sequence Aware Media Cloudization
H Wang
Cryptology ePrint Archive, 2022
12022
FFH-ABE: Fast File-Hierarchy Attribute-Based Encryption Scheme for the Internet of Things
H Wang, L Hang, F Luo
Authorea Preprints, 2023
2023
Comments on “P2AE: Preserving privacy, accuracy, and efficiency in location-dependent mobile crowdsensing”
F Luo, H Wang, X Yan
Authorea Preprints, 2023
2023
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20