default search action
Hua Zhang 0001
Person information
- affiliation: Beijing University of Posts and Telecommunications, State Key Laboratory of Networking and Switch Technology, China
Other persons with the same name
- Hua Zhang — disambiguation page
- Hua Zhang 0002 — Southeast University, National Mobile Communications Research Laboratory, Nanjing, China (and 2 more)
- Hua Zhang 0003 — Tianjin University of Technology, Key Laboratory of Computer Vision and System, Tianjin, China (and 1 more)
- Hua Zhang 0004 — Chongqing University of Technology, School of Mathematics and Statistics, China (and 2 more)
- Hua Zhang 0005 — China University of Mining & Technology, Xuzhou, China
- Hua Zhang 0006 — Southwest Jiaotong University
- Hua Zhang 0007 — Southern Medical University, Guangdong, China
- Hua Zhang 0008 — Chinese Academy of Sciences, State Key Lab of Information Security, Beijing, China (and 1 more)
- Hua Zhang 0009 — CAS, Institute of Automation
- Hua Zhang 0010 — Yunan Normal University, Department of Mathematics (and 1 more)
- Hua Zhang 0011 — Zhejiang Gongshang University, Hangzhou (and 2 more)
- Hua Zhang 0012 — Wuhan University of Science and Technology, School of Machinery and Automation, China
- Hua Zhang 0013 — Nanchang University, School of Mechatronics Engineering, China
- Hua Zhang 0014 — Xidian University, National Laboratory of Radar Signal Processing
- Hua Zhang 0015 — Xidian University, School of Aerospace Science and Technology
- Hua Zhang 0016 — Nanyang Technological University
- Hua Zhang 0017 — Key Laboratory of Robot and Welding Automation
- Hua Zhang 0018 — Google (and 1 more)
- Hua Zhang 0019 — The University of Texas at Dallas
- Hua Zhang 0020 — Shijiazhuang University of Applied Technology, China
- Hua Zhang 0021 — Texas A&M University, Corpus Christi, TX, USA (and 3 more)
- Hua Zhang 0022 — San Diego State University, Department of Electrical and Computer Engineering, CA, USA (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j79]Tengfei Tu, Hua Zhang, Bei Gong, Daizhong Du, Qiaoyan Wen:
Intelligent analysis of android application privacy policy and permission consistency. Artif. Intell. Rev. 57(7): 172 (2024) - [j78]Yanxin Xu, Hua Zhang, Shaohua Zhao, Xin Zhang, Wenmin Li, Fei Gao, Kaixuan Li:
Comments on "VERSA: Verifiable Secure Aggregation for Cross-Device Federated Learning". IEEE Trans. Dependable Secur. Comput. 21(4): 4297-4298 (2024) - [j77]Haoran Gao, Hua Zhang, Jiahui Wang, Xin Zhang, Huawei Wang, Wenmin Li, Tengfei Tu:
NUAT-GAN: Generating Black-Box Natural Universal Adversarial Triggers for Text Classifiers Using Generative Adversarial Networks. IEEE Trans. Inf. Forensics Secur. 19: 6484-6498 (2024) - [j76]Boqin Qin, Yilun Chen, Haopeng Liu, Hua Zhang, Qiaoyan Wen, Linhai Song, Yiying Zhang:
Understanding and Detecting Real-World Safety Issues in Rust. IEEE Trans. Software Eng. 50(6): 1306-1324 (2024) - 2023
- [j75]Hua Zhang, Xin Zhang, Ziqing Guo, Huawei Wang, Dong Cui, Qiaoyan Wen:
Secure and Efficiently Searchable IoT Communication Data Management Model: Using Blockchain as a New Tool. IEEE Internet Things J. 10(14): 11985-11999 (2023) - [j74]Wenmin Li, Yang Chen, Fei Gao, Shuo Zhang, Hua Zhang, Qiaoyan Wen:
Privacy Protection Data Retrieval Scheme With Inverted Index for IoT Based on Blockchain. IEEE Internet Things J. 10(14): 12090-12101 (2023) - [j73]Hua Zhang, Kaixuan Li, Teng Huang, Xin Zhang, Wenmin Li, Zhengping Jin, Fei Gao, Minghui Gao:
Publishing locally private high-dimensional synthetic data efficiently. Inf. Sci. 633: 343-356 (2023) - [j72]Tengfei Tu, Hua Zhang, Yangye Hu, Dong Cui, Xilin Zhai:
A detector for Android repackaged applications with layout-fingerprint. J. Inf. Secur. Appl. 76: 103527 (2023) - [j71]Haoran Gao, Hua Zhang, Xin Zhang, Wenmin Li, Jiahui Wang, Fei Gao:
Enhanced covertness class discriminative universal adversarial perturbations. Neural Networks 165: 516-526 (2023) - [j70]Hua Zhang, Shaohua Zhao, Ziqing Guo, Qiaoyan Wen, Wenmin Li, Fei Gao:
Scalable Fuzzy Keyword Ranked Search Over Encrypted Data on Hybrid Clouds. IEEE Trans. Cloud Comput. 11(1): 308-323 (2023) - 2022
- [j69]Ping Yu, Wei Ni, Hua Zhang, Ren Ping Liu, Qiaoyan Wen, Wenmin Li, Fei Gao:
Secure and Differentiated Fog-Assisted Data Access for Internet of Things. Comput. J. 65(8): 1948-1963 (2022) - [j68]Tengfei Tu, Jiawei Qin, Hua Zhang, Miao Chen, Tong Xu, Yue Huang:
A comprehensive study of Mozi botnet. Int. J. Intell. Syst. 37(10): 6877-6908 (2022) - [j67]Shaohua Zhao, Hua Zhang, Xin Zhang, Wenmin Li, Fei Gao, Qiaoyan Wen:
Forward privacy multikeyword ranked search over encrypted database. Int. J. Intell. Syst. 37(10): 7356-7378 (2022) - [j66]Huawei Wang, Yiwei Liu, Peng Yin, Hua Zhang, Xin Xu, Qiaoyan Wen:
Label specificity attack: Change your label as I want. Int. J. Intell. Syst. 37(10): 7767-7786 (2022) - [j65]Yunping Gong, Fei Gao, Wenmin Li, Hua Zhang, Zhengping Jin, Qiaoyan Wen:
A rORAM scheme with logarithmic bandwidth and logarithmic locality. Int. J. Intell. Syst. 37(10): 8068-8091 (2022) - [j64]Haoran Gao, Hua Zhang, Xingguo Yang, Wenmin Li, Fei Gao, Qiaoyan Wen:
Generating natural adversarial examples with universal perturbations for text classification. Neurocomputing 471: 175-182 (2022) - [j63]Senmiao Wang, Hua Zhang, Su-Juan Qin, Wenmin Li, Tengfei Tu, Ana Shen, Wentao Liu:
KRProtector: Detection and Files Protection for IoT Devices on Android Without ROOT Against Ransomware Based on Decoys. IEEE Internet Things J. 9(19): 18251-18266 (2022) - [j62]Yongsheng Li, Tengfei Tu, Hua Zhang, JiShuai Li, Zhengping Jin, Qiaoyan Wen:
Sound Can Help Us See More Clearly. Sensors 22(2): 599 (2022) - [j61]Hao Lin, Fei Gao, Hua Zhang, Zhengping Jin, Wenmin Li, Qiaoyan Wen:
Public Key Encryption With Equality Test Supporting Flexible Designated Authorization in Cloud Storage. IEEE Syst. J. 16(1): 1460-1470 (2022) - [j60]Ping Yu, Wei Ni, Ren Ping Liu, Zhaoxin Zhang, Hua Zhang, Qiaoyan Wen:
Efficient Encrypted Range Query on Cloud Platforms. ACM Trans. Cyber Phys. Syst. 6(3): 27:1-27:23 (2022) - [j59]Yang Chen, Wenmin Li, Fei Gao, Qiaoyan Wen, Hua Zhang, Huawei Wang:
Practical Attribute-Based Multi-Keyword Ranked Search Scheme in Cloud Computing. IEEE Trans. Serv. Comput. 15(2): 724-735 (2022) - [j58]Wei Guo, Su-Juan Qin, Fei Gao, Hua Zhang, Wenmin Li, Zhengping Jin, Qiaoyan Wen:
Dynamic Proof of Data Possession and Replication With Tree Sharing and Batch Verification in the Cloud. IEEE Trans. Serv. Comput. 15(4): 1813-1824 (2022) - [c8]Miao Chen, Tengfei Tu, Hua Zhang, Qiaoyan Wen, Weihang Wang:
Jasmine: A Static Analysis Framework for Spring Core Technologies. ASE 2022: 60:1-60:13 - 2021
- [j57]Ping Yu, Wei Ni, Guangsheng Yu, Hua Zhang, Ren Ping Liu, Qiaoyan Wen:
Efficient Anonymous Data Authentication for Vehicular Ad Hoc Networks. Secur. Commun. Networks 2021: 6638453:1-6638453:14 (2021) - [j56]Wenmin Li, Sanqi Sun, Shuo Zhang, Hua Zhang, Yijie Shi:
Cost-Sensitive Approach to Improve the HTTP Traffic Detection Performance on Imbalanced Data. Secur. Commun. Networks 2021: 6674325:1-6674325:11 (2021) - [j55]Senmiao Wang, Su-Juan Qin, Nengqiang He, Tengfei Tu, Junjie Hou, Hua Zhang, Yijie Shi:
KRRecover: An Auto-Recovery Tool for Hijacked Devices and Encrypted Files by Ransomwares on Android. Symmetry 13(5): 861 (2021) - [j54]Hua Zhang, Ziqing Guo, Shaohua Zhao, Qiaoyan Wen:
Privacy-Preserving Linear Region Search Service. IEEE Trans. Serv. Comput. 14(1): 207-221 (2021) - [j53]Hao Lin, Hua Zhang, Hanbing Yan, Huawei Wang, Yijie Shi, Fei Gao, Qiaoyan Wen:
A Secure Online Treatment Blockchain Service. Wirel. Pers. Commun. 117(3): 1773-1795 (2021) - 2020
- [j52]Hua Zhang, Xueqi Jin, Ying Li, Zhengwei Jiang, Ye Liang, Zhengping Jin, Qiaoyan Wen:
A Multi-Step Attack Detection Model Based on Alerts of Smart Grid Monitoring System. IEEE Access 8: 1031-1047 (2020) - [j51]Jiawei Qin, Hua Zhang, Jing Guo, Senmiao Wang, Qiaoyan Wen, Yijie Shi:
Vulnerability Detection on Android Apps-Inspired by Case Study on Vulnerability Related With Web Functions. IEEE Access 8: 106437-106451 (2020) - [j50]Caijun Sun, Hua Zhang, Su-Juan Qin, Jiawei Qin, Yijie Shi, Qiaoyan Wen:
DroidPDF: The Obfuscation Resilient Packer Detection Framework for Android Apps. IEEE Access 8: 167460-167474 (2020) - [j49]Yang Chen, Wenmin Li, Fei Gao, Kaitai Liang, Hua Zhang, Qiaoyan Wen:
Practical Attribute-Based Conjunctive Keyword Search Scheme. Comput. J. 63(8): 1203-1215 (2020) - [j48]Zhidan Li, Wenmin Li, Fei Gao, Ping Yu, Hua Zhang, Zhengping Jin, Qiaoyan Wen:
New Blind Filter Protocol: An Improved Privacy-Preserving Scheme for Location-Based Services. Comput. J. 63(12): 1886-1903 (2020) - [j47]Dianli Guo, Qiaoyan Wen, Wenmin Li, Hua Zhang, Zhengping Jin:
Adaptively secure broadcast encryption with authenticated content distributors. Multim. Tools Appl. 79(11-12): 7889-7910 (2020) - [j46]Yuanbo Cui, Fei Gao, Wenmin Li, Yijie Shi, Hua Zhang, Qiaoyan Wen, Emmanouil Panaousis:
Cache-Based Privacy Preserving Solution for Location and Content Protection in Location-Based Services. Sensors 20(16): 4651 (2020) - [j45]Shuo Zhang, Qiaoyan Wen, Wenmin Li, Hua Zhang, Zhengping Jin:
A Multi-User Public Key Encryption with Multi-Keyword Search out of Bilinear Pairings. Sensors 20(23): 6962 (2020) - [j44]Yuanbo Cui, Fei Gao, Hua Zhang, Wenmin Li, Zhengping Jin:
KNN search-based trajectory cloaking against the Cell-ID tracking in cellular network. Soft Comput. 24(2): 965-980 (2020) - [j43]Wei Guo, Su-Juan Qin, Fei Gao, Hua Zhang, Wenmin Li, Zhengping Jin, Qiaoyan Wen:
Comments on "Provable Multicopy Dynamic Data Possession in Cloud Computing Systems". IEEE Trans. Inf. Forensics Secur. 15: 2584-2586 (2020) - [j42]Hua Zhang, Boqin Qin, Tengfei Tu, Ziqing Guo, Fei Gao, Qiaoyan Wen:
An Adaptive Encryption-as-a-Service Architecture Based on Fog Computing for Real-Time Substation Communications. IEEE Trans. Ind. Informatics 16(1): 658-668 (2020) - [j41]Lu Rao, Hua Zhang, Tengfei Tu:
Dynamic Outsourced Auditing Services for Cloud Storage Based on Batch-Leaves-Authenticated Merkle Hash Tree. IEEE Trans. Serv. Comput. 13(3): 451-463 (2020) - [j40]Hua Zhang, Jiawei Qin, Boan Zhang, Hanbing Yan, Jing Guo, Fei Gao, Senmiao Wang, Yangye Hu:
A Multiclass Detection System for Android Malicious Apps Based on Color Image Features. Wirel. Commun. Mob. Comput. 2020: 8882295:1-8882295:21 (2020) - [j39]Shuo Zhang, Wenmin Li, Qiaoyan Wen, Hua Zhang, Zhengping Jin:
A Flexible KP-ABE Suit for Mobile User Realizing Decryption Outsourcing and Attribute Revocation. Wirel. Pers. Commun. 114(4): 2783-2800 (2020)
2010 – 2019
- 2019
- [j38]Zhidan Li, Wenmin Li, Zhengping Jin, Hua Zhang, Qiaoyan Wen:
An Efficient ABE Scheme With Verifiable Outsourced Encryption and Decryption. IEEE Access 7: 29023-29037 (2019) - [j37]Jiawei Qin, Hua Zhang, Senmiao Wang, Zhikui Geng, Tengfei Chen:
Acteve++: An Improved Android Application Automatic Tester Based on Acteve. IEEE Access 7: 31358-31363 (2019) - [j36]Huawei Wang, Dianli Guo, Qiaoyan Wen, Hua Zhang:
A Robust Authentication Scheme for Multiple Servers Architecture. IEEE Access 7: 111222-111231 (2019) - [j35]Huawei Wang, Dianli Guo, Qiaoyan Wen, Hua Zhang:
Chaotic Map-Based Authentication Protocol for Multiple Servers Architecture. IEEE Access 7: 161340-161349 (2019) - [j34]Yang Chen, Wenmin Li, Fei Gao, Wei Yin, Kaitai Liang, Hua Zhang, Qiaoyan Wen:
Efficient Attribute-Based Data Sharing Scheme with Hidden Access Structures. Comput. J. 62(12): 1748-1760 (2019) - [j33]Wei Guo, Hua Zhang, Su-Juan Qin, Fei Gao, Zhengping Jin, Wenmin Li, Qiaoyan Wen:
Outsourced dynamic provable data possession with batch update for secure cloud storage. Future Gener. Comput. Syst. 95: 309-322 (2019) - [j32]Dianli Guo, Qiaoyan Wen, Zhengping Jin, Hua Zhang, Wenmin Li:
Authenticated public key broadcast encryption with short ciphertexts. Multim. Tools Appl. 78(16): 23399-23414 (2019) - [j31]Huawei Wang, Dianli Guo, Hua Zhang, Qiaoyan Wen:
Robust Multiple Servers Architecture Based Authentication Scheme Preserving Anonymity. Sensors 19(14): 3144 (2019) - [j30]Ping Yu, Qiaoyan Wen, Wei Ni, Wenmin Li, Caijun Sun, Hua Zhang, Zhengping Jin:
Decentralized, Revocable and Verifiable Attribute-Based Encryption in Hybrid Cloud System. Wirel. Pers. Commun. 106(2): 719-738 (2019) - [i8]Zhidan Li, Wenmin Li, Fei Gao, Wei Yin, Hua Zhang, Qiaoyan Wen, Kaitai Liang:
Towards Privacy-Preserving and Efficient Attribute-Based Multi-Keyword Search. IACR Cryptol. ePrint Arch. 2019: 1314 (2019) - 2018
- [j29]Wei Yin, Qiaoyan Wen, Wenmin Li, Hua Zhang, Zhengping Jin:
An Anti-Quantum Transaction Authentication Approach in Blockchain. IEEE Access 6: 5393-5401 (2018) - [j28]Yang Chen, Qiaoyan Wen, Wenmin Li, Hua Zhang, Zhengping Jin:
Generic Construction of Outsourced Attribute-Based Encryption Without Key Escrow. IEEE Access 6: 58955-58966 (2018) - [j27]Wei Yin, Qiaoyan Wen, Kaitai Liang, Zhenfei Zhang, Liqun Chen, Hanbing Yan, Hua Zhang:
Delegation of Decryption Rights With Revocability From Learning With Errors. IEEE Access 6: 61163-61175 (2018) - [j26]Caijun Sun, Hua Zhang, Su-Juan Qin, Nengqiang He, Jiawei Qin, Hongwei Pan:
DexX: A Double Layer Unpacking Framework for Android. IEEE Access 6: 61267-61276 (2018) - [j25]Hua Zhang, Hongchao Guan, Hanbing Yan, Wenmin Li, Yuqi Yu, Hao Zhou, Xingyu Zeng:
Webshell Traffic Detection With Character-Level Features Based on Deep Learning. IEEE Access 6: 75268-75277 (2018) - [j24]Ziqing Guo, Hua Zhang, Caijun Sun, Qiaoyan Wen, Wenmin Li:
Secure multi-keyword ranked search over encrypted cloud data for multiple data owners. J. Syst. Softw. 137: 380-395 (2018) - [j23]Lu Rao, Tengfei Tu, Hua Zhang, Qiaoyan Wen, Jia Xiao:
Dynamic Outsourced Proofs of Retrievability Enabling Auditing Migration for Remote Storage Security. Wirel. Commun. Mob. Comput. 2018: 4186243:1-4186243:19 (2018) - [c7]Wei Yin, Qiaoyan Wen, Wenmin Li, Hua Zhang, Zhengping Jin:
A New Insight - Proxy Re-encryption Under LWE with Strong Anti-collusion. ISPEC 2018: 559-577 - [i7]Ziqing Guo, Hua Zhang, Xin Zhang, Zhengping Jin, Qiaoyan Wen:
Secure and Efficiently Searchable IoT Communication Data Management Model: Using Blockchain as a new tool. CoRR abs/1812.08603 (2018) - [i6]Wei Yin, Qiaoyan Wen, Kaitai Liang, Zhenfei Zhang, Liqun Chen, Hanbing Yan, Hua Zhang:
Delegation of Decryption Rights with Revocability from Learning with Errors. IACR Cryptol. ePrint Arch. 2018: 777 (2018) - 2017
- [j22]Wei Yin, Qiaoyan Wen, Wenmin Li, Hua Zhang, Ping Zheng:
Identity Based Proxy Re-encryption Scheme under LWE. KSII Trans. Internet Inf. Syst. 11(12): 6116-6132 (2017) - [j21]Wenmin Li, Xuelei Li, Qiao-Yan Wen, Shuo Zhang, Hua Zhang:
Flexible CP-ABE Based Access Control on Encrypted Data for Mobile Users in Hybrid Cloud System. J. Comput. Sci. Technol. 32(5): 974-990 (2017) - [j20]Tengfei Tu, Lu Rao, Hua Zhang, Qiaoyan Wen, Jia Xiao:
Privacy-Preserving Outsourced Auditing Scheme for Dynamic Data Storage in Cloud. Secur. Commun. Networks 2017: 4603237:1-4603237:17 (2017) - 2016
- [j19]Rui Wang, Qiaoyan Wen, Hua Zhang, Xuelei Li:
A Novel Protocol-Feature Attack against Tor's Hidden Service. IEICE Trans. Inf. Syst. 99-D(4): 839-849 (2016) - [j18]Rui Wang, Qiaoyan Wen, Hua Zhang, Su-Juan Qin, Wenmin Li:
Transparent Discovery of Hidden Service. IEICE Trans. Inf. Syst. 99-D(11): 2817-2820 (2016) - [j17]Dianli Guo, Qiaoyan Wen, Wenmin Li, Hua Zhang, Zhengping Jin:
Adaptively Secure Broadcast Encryption With Constant Ciphertexts. IEEE Trans. Broadcast. 62(3): 709-715 (2016) - 2015
- [j16]Peng Jiang, Qiaoyan Wen, Wenmin Li, Zhengping Jin, Hua Zhang:
An anonymous and efficient remote biometrics user authentication scheme in a multi server environment. Frontiers Comput. Sci. 9(1): 142-156 (2015) - [j15]Lin Cheng, Qiaoyan Wen, Zhengping Jin, Hua Zhang, Liming Zhou:
Cryptanalysis and improvement of a certificateless aggregate signature scheme. Inf. Sci. 295: 337-346 (2015) - [j14]Dianli Guo, Qiaoyan Wen, Wenmin Li, Hua Zhang, Zhengping Jin:
An Improved Biometrics-Based Authentication Scheme for Telecare Medical Information Systems. J. Medical Syst. 39(3): 20 (2015) - [j13]Dianli Guo, Qiaoyan Wen, Wenmin Li, Hua Zhang, Zhengping Jin:
A Novel Authentication Scheme Using Self-certified Public Keys for Telecare Medical Information Systems. J. Medical Syst. 39(6): 62:1-62:8 (2015) - [j12]Haiyan Sun, Qiaoyan Wen, Hua Zhang, Zhengping Jin:
A strongly secure identity-based authenticated key agreement protocol without pairings under the GDH assumption. Secur. Commun. Networks 8(17): 3167-3179 (2015) - [j11]Dianli Guo, Qiaoyan Wen, Wenmin Li, Hua Zhang, Zhengping Jin:
Analysis and Improvement of 'Chaotic Map Based Mobile Dynamic ID Authenticated Key Agreement Scheme'. Wirel. Pers. Commun. 83(1): 35-48 (2015) - 2014
- [j10]Lin Cheng, Qiaoyan Wen, Zhengping Jin, Hua Zhang:
Cryptanalysis and improvement of a certificateless encryption scheme in the standard model. Frontiers Comput. Sci. 8(1): 163-173 (2014) - [j9]Xiuhua Lu, Qiaoyan Wen, Wenmin Li, Licheng Wang, Hua Zhang:
A Fuzzy Identity-Based Signcryption Scheme from Lattices. KSII Trans. Internet Inf. Syst. 8(11): 4203-4225 (2014) - [j8]Xin Xu, Ping Zhu, Qiaoyan Wen, Zhengping Jin, Hua Zhang, Lian He:
A Secure and Efficient Authentication and Key Agreement Scheme Based on ECC for Telecare Medicine Information Systems. J. Medical Syst. 38(1): 9994 (2014) - [j7]Xuelei Li, Qiaoyan Wen, Wenmin Li, Hua Zhang, Zhengping Jin:
Secure Privacy-Preserving Biometric Authentication Scheme for Telecare Medicine Information Systems. J. Medical Syst. 38(11): 139 (2014) - 2013
- [j6]Haiyan Sun, Qiaoyan Wen, Hua Zhang, Zhengping Jin:
A novel pairing-free certificateless authenticated key agreement protocol with provable security. Frontiers Comput. Sci. 7(4): 544-557 (2013) - [j5]Xuelei Li, Qiaoyan Wen, Hua Zhang, Zhengping Jin:
An improved authentication with key agreement scheme on elliptic curve cryptosystem for global mobility networks. Int. J. Netw. Manag. 23(5): 311-324 (2013) - [j4]Haiyan Sun, Qiaoyan Wen, Hua Zhang, Zhengping Jin:
A Strongly Secure Pairing-free Certificateless Authenticated Key Agreement Protocol for Low-Power Devices. Inf. Technol. Control. 42(2): 191-204 (2013) - [j3]Rui Guo, Qiaoyan Wen, Huixian Shi, Zhengping Jin, Hua Zhang:
An Efficient and Provably-Secure Certificateless Public Key Encryption Scheme for Telecare Medicine Information Systems. J. Medical Syst. 37(5): 9965 (2013) - [c6]Lin Cheng, Zhengping Jin, Qiaoyan Wen, Hua Zhang:
A novel privacy preserving keyword searching for cloud storage. PST 2013: 77-81 - [i5]Haiyan Sun, Qiaoyan Wen, Hua Zhang, Zhengping Jin, Wenmin Li:
Cryptanalysis and improvement of two certificateless three-party authenticated key agreement protocols. CoRR abs/1301.5091 (2013) - [i4]Lin Cheng, Qiaoyan Wen, Zhengping Jin, Hua Zhang, Liming Zhou:
On the security of a certificateless aggregate signature scheme. IACR Cryptol. ePrint Arch. 2013: 93 (2013) - [i3]Lin Cheng, Qiaoyan Wen, Zhengping Jin, Hua Zhang:
On the security of a certi cateless signature scheme in the standard model. IACR Cryptol. ePrint Arch. 2013: 153 (2013) - 2012
- [j2]Min Zhang, Jie Zhang, Zhengping Jin, Hua Zhang, Qiao-Yan Wen:
A Light-Weight Rainbow Signature Scheme for WSN. J. Networks 7(8): 1272-1279 (2012) - [c5]Zhaoxing Wang, Qiaoyan Wen, Yi Sun, Hua Zhang:
A Fault Detection Scheme Based on Self-Clustering Nodes Sets for Wireless Sensor Networks. CIT 2012: 921-925 - [c4]Zhaoxing Wang, Qiaoyan Wen, Teng Wang, Hua Zhang:
A Fault Detection Method for Wireless Sensor Networks Based on Credible Sensor Nodes Set. ICEBE 2012: 260-264 - [c3]Maozhen Ding, Fei Gao, Zhengping Jin, Hua Zhang:
An efficient Public Key Encryption with Conjunctive Keyword Search scheme based on pairings. IC-NIDC 2012: 526-530 - 2011
- [c2]Yi Sun, Hongxiang Sun, Qiaoyan Wen, Hua Zhang:
A Deterministic Protocol for Rational Secret Sharing in Asynchronous Model. IPTC 2011: 5-8 - [i2]Min Zhang, Jie Zhang, Qiao-Yan Wen, Zhengping Jin, Hua Zhang:
Analysis and improvement of a strongly secure certificateless key exchange protocol without pairing. CoRR abs/1112.0649 (2011) - 2010
- [c1]Yi Sun, Hongxiang Sun, Hua Zhang, Qiao-Yan Wen:
A Secure Protocol for Point-Segment Position Problem. WISM 2010: 212-219 - [i1]Zhengping Jin, Qiaoyan Wen, Hua Zhang:
A supplement to Liu et al.'s certificateless signcryption scheme in the standard model. IACR Cryptol. ePrint Arch. 2010: 252 (2010)
2000 – 2009
- 2009
- [j1]Hua Zhang, Qiao-Yan Wen, Jie Zhang, Wenmin Li:
A constant rounds group key agreement protocol without using hash functions. Int. J. Netw. Manag. 19(6): 457-464 (2009)
Coauthor Index
aka: Qiao-Yan Wen
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 21:30 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint