Folgen
Haiyan Wang(王海燕)
Haiyan Wang(王海燕)
Peng Cheng Laboratory
Bestätigte E-Mail-Adresse bei pcl.ac.cn
Titel
Zitiert von
Zitiert von
Jahr
A fast CP-ABE system for cyber-physical security and privacy in mobile healthcare network
S Wang, H Wang, J Li, H Wang, J Chaudhry, M Alazab, H Song
IEEE Transactions on Industry Applications 56 (4), 4467-4477, 2020
952020
An efficient attribute-based encryption scheme with policy update and file update in cloud computing
J Li, S Wang, Y Li, H Wang, H Wang, H Wang, J Chen, Z You
IEEE Transactions on Industrial Informatics 15 (12), 6500-6509, 2019
912019
A fast and flexible attribute-based searchable encryption scheme supporting multi-search mechanism in cloud computing
H Wang, Y Li, W Susilo, DH Duong, F Luo
Computer Standards & Interfaces 82, 103635, 2022
252022
An efficient ciphertext-policy attribute-based encryption scheme supporting collaborative decryption with blockchain
Y He, H Wang, Y Li, K Huang, VCM Leung, FR Yu, Z Ming
IEEE Internet of Things Journal 9 (4), 2722-2733, 2021
212021
Linearization of multi-valued nonlinear feedback shift registers
H Wang, J Zhong, D Lin
Journal of Systems Science and Complexity 30 (2), 494-509, 2017
102017
Revocable attribute-based encryption from standard lattices
F Luo, S Al-Kuwari, H Wang, F Wang, K Chen
Computer Standards & Interfaces 84, 103698, 2023
82023
Attribute-based searchable encryption scheme supporting efficient range search in cloud computing
Y Li, H Wang, S Wang, Y Ding
2021 IEEE Conference on Dependable and Secure Computing (DSC), 1-8, 2021
82021
Public Trace-and-Revoke Proxy Re-encryption for Secure Data Sharing in Clouds
F Luo, H Wang, W Susilo, X Yan, X Zheng
IEEE Transactions on Information Forensics and Security, 2024
32024
Multi-key Fully Homomorphic Encryption without CRS from RLWE
F Luo, H Wang, AK Saif, W Han
Computer Standards & Interfaces 86, 103742, 2023
32023
Generic construction of trace-and-revoke inner product functional encryption
F Luo, S Al-Kuwari, H Wang, W Han
European Symposium on Research in Computer Security, 259-282, 2022
32022
Attribute-based weighted keyword search scheme supporting multi-search mechanism in fog computing
S Wang, Y Li, H Wang, X Zhang, J Chen
2020 7th IEEE International Conference on Cyber Security and Cloud Computing …, 2020
32020
ABAEKS: Attribute-Based Authenticated Encryption with Keyword Search over Outsourced Encrypted Data
F Luo, H Wang, C Lin, X Yan
IEEE Transactions on Information Forensics and Security, 2023
22023
On Stability of Multi‐Valued Nonlinear Feedback Shift Registers
H Wang, Q Lin, J Chen, J Li, J Zhong, D Lin, J Wang, L Ma
Complexity 2019 (1), 8765970, 2019
22019
The generating set of the differential invariant algebra and Maurer-Cartan equations of a (2+ 1)-dimensional burgers equation
J Mei, H Wang
Journal of Systems Science and Complexity 26 (2), 281-290, 2013
22013
Re-PAEKS: Public-key Authenticated Re-Encryption with Keyword Search
F Luo, H Wang, X Yan
IEEE Transactions on Mobile Computing, 2024
12024
Fully collusion resistant trace-and-revoke functional encryption for arbitrary identities
F Luo, S Al-Kuwari, H Wang, X Yan
Theoretical Computer Science 987, 114368, 2024
12024
Comments on “VERSA: Verifiable Secure Aggregation for Cross-Device Federated Learning”
F Luo, H Wang, X Yan
IEEE Transactions on Dependable and Secure Computing, 2023
12023
FFH-ABE: Fast File-Hierarchy Attribute-Based Encryption Scheme for the Internet of Things
H Wang, L Hang, F Luo
Authorea Preprints, 2023
2023
Comments on “P2AE: Preserving privacy, accuracy, and efficiency in location-dependent mobile crowdsensing”
F Luo, H Wang, X Yan
Authorea Preprints, 2023
2023
Comments on “BSIF: Blockchain-Based Secure, Interactive, and Fair Mobile Crowdsensing”
H Wang, F Luo, X Yan
Authorea Preprints, 2023
2023
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20