default search action
Huaqun Wang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j112]Luona Yin, Huaqun Wang:
Conditional privacy-preserving spectrum trading scheme based on traceable ring signature for DSS system. J. Supercomput. 81(1): 14 (2025) - 2024
- [j111]Hui Cui, Zhiguo Wan, Tianyu Zhaolu, Huaqun Wang, Atsuko Miyaji:
Pay-Per-Proof: Decentralized Outsourced Multi-User PoR for Cloud Storage Payment Using Blockchain. IEEE Trans. Cloud Comput. 12(1): 130-144 (2024) - [j110]Hui Cui, Zhiguo Wan, Rui Gao, Huaqun Wang:
Outsourced Privately Verifiable Proofs of Retrievability via Blockchain. IEEE Trans. Dependable Secur. Comput. 21(4): 1501-1514 (2024) - [j109]Tianyu Zhaolu, Zhiguo Wan, Huaqun Wang:
Division of Regulatory Power: Collaborative Regulation for Privacy-Preserving Blockchains. IEEE Trans. Inf. Forensics Secur. 19: 2533-2548 (2024) - [j108]Mengxue Yang, Huaqun Wang, Debiao He:
Puncturable Attribute-Based Encryption From Lattices for Classified Document Sharing. IEEE Trans. Inf. Forensics Secur. 19: 4028-4042 (2024) - [j107]Zijian Bao, Debiao He, Huaqun Wang, Min Luo, Cong Peng:
BAP: A Blockchain-Assisted Privacy-Preserving Authentication Protocol With User-Controlled Data Linkability for VANETs. IEEE Trans. Intell. Veh. 9(2): 4206-4220 (2024) - [j106]Mengxue Yang, Huaqun Wang, Zhiguo Wan:
PUL-ABE: An Efficient and Quantum-Resistant CP-ABE With Policy Update in Cloud Storage. IEEE Trans. Serv. Comput. 17(3): 1126-1139 (2024) - [j105]Huaqun Wang, Zhiguo Wan, Debiao He, Jia Yu:
Synchronous Blockchain-Based Distributed Provable Data Possession With Forward-Security. IEEE Trans. Serv. Comput. 17(3): 1227-1238 (2024) - [j104]Yang Liu, Debiao He, Min Luo, Huaqun Wang, Qin Liu:
ATRC: An Anonymous Traceable and Revocable Credential System Using Blockchain for VANETs. IEEE Trans. Veh. Technol. 73(2): 2482-2494 (2024) - [i4]Rui Gao, Zhiguo Wan, Yuncong Hu, Huaqun Wang:
A Succinct Range Proof for Polynomial-based Vector Commitment. IACR Cryptol. ePrint Arch. 2024: 1016 (2024) - 2023
- [j103]Zijian Bao, Debiao He, Huaqun Wang, Min Luo, Cong Peng:
A Group Signature Scheme With Selective Linkability and Traceability for Blockchain-Based Data Sharing Systems in E-Health Services. IEEE Internet Things J. 10(23): 21115-21128 (2023) - [j102]Hui Dong, Mengjie Lv, Huaqun Wang, Weibei Fan:
Fault-tolerant unicast using conditional local safe model in the data center network BCube. J. Parallel Distributed Comput. 181: 104732 (2023) - [j101]Tian Li, Huaqun Wang, Debiao He, Jia Yu:
Designated-Verifier Aggregate Signature Scheme With Sensitive Data Privacy Protection for Permissioned Blockchain-Assisted IIoT. IEEE Trans. Inf. Forensics Secur. 18: 4640-4651 (2023) - [j100]Yulin Liu, Debiao He, Zijian Bao, Huaqun Wang, Muhammad Khurram Khan, Kim-Kwang Raymond Choo:
An Efficient Multilayered Linkable Ring Signature Scheme With Logarithmic Size for Anonymous Payment in Vehicle-to-Grid Networks. IEEE Trans. Intell. Veh. 8(4): 2998-3011 (2023) - [j99]Shenqing Wang, Chunpeng Ge, Lu Zhou, Huaqun Wang, Zhe Liu, Jian Wang:
Privacy-Preserving Classification in Multiple Clouds eHealthcare. IEEE Trans. Serv. Comput. 16(1): 493-503 (2023) - [j98]Suhui Liu, Liquan Chen, Ge Wu, Huaqun Wang, Hongtao Yu:
Blockchain-Backed Searchable Proxy Signcryption for Cloud Personal Health Records. IEEE Trans. Serv. Comput. 16(5): 3210-3223 (2023) - 2022
- [j97]Jinglin Zou, Debiao He, Sherali Zeadally, Neeraj Kumar, Huaqun Wang, Kim-Kwang Raymond Choo:
Integrated Blockchain and Cloud Computing Systems: A Systematic Survey, Solutions, and Challenges. ACM Comput. Surv. 54(8): 160:1-160:36 (2022) - [j96]Yi Yang, Debiao He, Huaqun Wang, Lu Zhou:
An efficient blockchain-based batch verification scheme for vehicular ad hoc networks. Trans. Emerg. Telecommun. Technol. 33(5) (2022) - [j95]Yaru Liu, Jia Yu, Ming Yang, Wenqiang Hou, Huaqun Wang:
Towards fully verifiable forward secure privacy preserving keyword search for IoT outsourced data. Future Gener. Comput. Syst. 128: 178-191 (2022) - [j94]Cong Peng, Min Luo, Huaqun Wang, Muhammad Khurram Khan, Debiao He:
An Efficient Privacy-Preserving Aggregation Scheme for Multidimensional Data in IoT. IEEE Internet Things J. 9(1): 589-600 (2022) - [j93]Jiguo Li, Yu Chen, Jinguang Han, Chengdong Liu, Yichen Zhang, Huaqun Wang:
Decentralized Attribute-Based Server-Aid Signature in the Internet of Things. IEEE Internet Things J. 9(6): 4573-4583 (2022) - [j92]Tian Li, Huaqun Wang, Debiao He, Jia Yu:
Blockchain-Based Privacy-Preserving and Rewarding Private Data Sharing for IoT. IEEE Internet Things J. 9(16): 15138-15149 (2022) - [j91]Wenjing Gao, Jia Yu, Ming Yang, Huaqun Wang:
Enabling Privacy-Preserving Parallel Outsourcing Matrix Inversion in IoT. IEEE Internet Things J. 9(17): 15915-15927 (2022) - [j90]Qi Li, Qianqian Zhang, Haiping Huang, Wei Zhang, Wei Chen, Huaqun Wang:
Secure, Efficient, and Weighted Access Control for Cloud-Assisted Industrial IoT. IEEE Internet Things J. 9(18): 16917-16927 (2022) - [j89]Xiaoying Jia, Min Luo, Huaqun Wang, Jian Shen, Debiao He:
A Blockchain-Assisted Privacy-Aware Authentication Scheme for Internet of Medical Things. IEEE Internet Things J. 9(21): 21838-21850 (2022) - [j88]Jing Wang, Libing Wu, Huaqun Wang, Kim-Kwang Raymond Choo, Lianhai Wang, Debiao He:
A Secure and Efficient Multiserver Authentication and Key Agreement Protocol for Internet of Vehicles. IEEE Internet Things J. 9(23): 24398-24416 (2022) - [j87]Qin Liu, Yunlian Liu, Min Luo, Debiao He, Huaqun Wang, Kim-Kwang Raymond Choo:
The Security of Blockchain-Based Medical Systems: Research Challenges and Opportunities. IEEE Syst. J. 16(4): 5741-5752 (2022) - [j86]Anmin Fu, Shui Yu, Yuqing Zhang, Huaqun Wang, Chanying Huang:
NPP: A New Privacy-Aware Public Auditing Scheme for Cloud Data Sharing with Group Users. IEEE Trans. Big Data 8(1): 14-24 (2022) - [j85]Lei Zhou, Anmin Fu, Guomin Yang, Huaqun Wang, Yuqing Zhang:
Efficient Certificateless Multi-Copy Integrity Auditing Scheme Supporting Data Dynamics. IEEE Trans. Dependable Secur. Comput. 19(2): 1118-1132 (2022) - [j84]Xiang Gao, Jia Yu, Yan Chang, Huaqun Wang, Jianxi Fan:
Checking Only When It Is Necessary: Enabling Integrity Auditing Based on the Keyword With Sensitive Information Privacy for Encrypted Cloud Data. IEEE Trans. Dependable Secur. Comput. 19(6): 3774-3789 (2022) - [j83]Tian Li, Huaqun Wang, Debiao He, Jia Yu:
Synchronized Provable Data Possession Based on Blockchain for Digital Twin. IEEE Trans. Inf. Forensics Secur. 17: 472-485 (2022) - [j82]Anmin Fu, Xianglong Zhang, Naixue Xiong, Yansong Gao, Huaqun Wang, Jing Zhang:
VFL: A Verifiable Federated Learning With Privacy-Preserving for Big Data in Industrial IoT. IEEE Trans. Ind. Informatics 18(5): 3316-3326 (2022) - [j81]Suhui Liu, Liquan Chen, Huaqun Wang, Shihui Fu, Lin Shi:
O³HSC: Outsourced Online/Offline Hybrid Signcryption for Wireless Body Area Networks. IEEE Trans. Netw. Serv. Manag. 19(3): 2421-2433 (2022) - [j80]Guoxiu Liu, Geng Yang, Shuangjie Bai, Huaqun Wang, Yang Xiang:
FASE: A Fast and Accurate Privacy-Preserving Multi-Keyword Top-k Retrieval Scheme Over Encrypted Cloud Data. IEEE Trans. Serv. Comput. 15(4): 1855-1867 (2022) - [j79]Hua Dai, Maohu Yang, T. G. Yang, Yang Xiang, Zheng Hu, Huaqun Wang:
A Keyword-Grouping Inverted Index Based Multi-Keyword Ranked Search Scheme Over Encrypted Cloud Data. IEEE Trans. Sustain. Comput. 7(3): 561-578 (2022) - [i3]Tianyu Zhaolu, Zhiguo Wan, Huaqun Wang:
Division of Regulatory Power: Collaborative Regulation for Privacy-Preserving Blockchains. IACR Cryptol. ePrint Arch. 2022: 1634 (2022) - 2021
- [j78]Jiguo Li, Min Wang, Yang Lu, Yichen Zhang, Huaqun Wang:
ABKS-SKGA: Attribute-based keyword search secure against keyword guessing attack. Comput. Stand. Interfaces 74: 103471 (2021) - [j77]Tianqi Zhou, Jian Shen, Huaqun Wang:
An efficient resource sharing scheme based on the linear feedback shift register. Int. J. Sens. Networks 37(3): 141-147 (2021) - [j76]Jing Wang, Libing Wu, Huaqun Wang, Kim-Kwang Raymond Choo, Debiao He:
An Efficient and Privacy-Preserving Outsourced Support Vector Machine Training for Internet of Medical Things. IEEE Internet Things J. 8(1): 458-473 (2021) - [j75]Aiqing Zhang, Peiyun Zhang, Huaqun Wang, Xiaodong Lin:
Application-Oriented Block Generation for Consortium Blockchain-Based IoT Systems With Dynamic Device Management. IEEE Internet Things J. 8(10): 7874-7888 (2021) - [j74]Tian Li, Huaqun Wang, Debiao He, Jia Yu:
Permissioned Blockchain-Based Anonymous and Traceable Aggregate Signature Scheme for Industrial Internet of Things. IEEE Internet Things J. 8(10): 8387-8398 (2021) - [j73]Xinrui Ge, Jia Yu, Fei Chen, Fanyu Kong, Huaqun Wang:
Toward Verifiable Phrase Search Over Encrypted Cloud-Based IoT Data. IEEE Internet Things J. 8(16): 12902-12918 (2021) - [j72]Lei Zhou, Anmin Fu, Yi Mu, Huaqun Wang, Shui Yu, Yinxia Sun:
Multicopy provable data possession scheme supporting data dynamics for cloud-based Electronic Medical Record system. Inf. Sci. 545: 254-276 (2021) - [j71]Huaqun Wang, Debiao He, Kim-Kwang Raymond Choo, Xi Chen:
Blockchain-based multi-party proof of assets with privacy preservation. Inf. Sci. 547: 609-621 (2021) - [j70]Peng Yi, Jiguo Li, Chengdong Liu, Jinguang Han, Huaqun Wang, Yichen Zhang, Yu Chen:
An efficient identity-based signature scheme with provable security. Inf. Sci. 576: 790-799 (2021) - [j69]Huaqun Wang, Debiao He, Jia Yu, Neal N. Xiong, Bin Wu:
RDIC: A blockchain-based remote data integrity checking scheme for IoT in 5G networks. J. Parallel Distributed Comput. 152: 1-10 (2021) - [j68]Zijian Bao, Min Luo, Huaqun Wang, Kim-Kwang Raymond Choo, Debiao He:
Blockchain-Based Secure Communication for Space Information Networks. IEEE Netw. 35(4): 50-57 (2021) - [j67]Huaqun Wang, Qihua Wang, Debiao He:
Blockchain-Based Private Provable Data Possession. IEEE Trans. Dependable Secur. Comput. 18(5): 2379-2389 (2021) - [j66]Tiantian Miao, Jian Shen, Chin-Feng Lai, Sai Ji, Huaqun Wang:
Fuzzy-Based Trustworthiness Evaluation Scheme for Privilege Management in Vehicular Ad Hoc Networks. IEEE Trans. Fuzzy Syst. 29(1): 137-147 (2021) - [j65]Biwen Chen, Debiao He, Neeraj Kumar, Huaqun Wang, Kim-Kwang Raymond Choo:
A Blockchain-Based Proxy Re-Encryption With Equality Test for Vehicular Communication Systems. IEEE Trans. Netw. Sci. Eng. 8(3): 2048-2059 (2021) - [j64]Huaqun Wang, Debiao He, Anmin Fu, Qi Li, Qihua Wang:
Provable Data Possession with Outsourced Data Transfer. IEEE Trans. Serv. Comput. 14(6): 1929-1939 (2021) - [c17]Zhixin Zhao, Chunpeng Ge, Lu Zhou, Huaqun Wang:
Fully Discover the Balance of Lightning Network Payment Channels. WASA (1) 2021: 159-173 - 2020
- [j63]Feng Wang, Li Xu, Kim-Kwang Raymond Choo, Yuexin Zhang, Huaqun Wang, Jiguo Li:
Lightweight Certificate-Based Public/Private Auditing Scheme Based on Bilinear Pairing for Cloud Storage. IEEE Access 8: 2258-2271 (2020) - [j62]Huaqun Wang, Debiao He, Yimu Ji:
Designated-verifier proof of assets for bitcoin exchange using elliptic curve cryptography. Future Gener. Comput. Syst. 107: 854-862 (2020) - [j61]Qi Feng, Debiao He, Huaqun Wang, Ding Wang, Xinyi Huang:
Multi-party key generation protocol for the identity-based signature scheme in the IEEE P1363 standard for public key cryptography. IET Inf. Secur. 14(6): 724-732 (2020) - [j60]Hanlin Zhang, Jia Yu, Chengliang Tian, Le Tong, Jie Lin, Linqiang Ge, Huaqun Wang:
Efficient and Secure Outsourcing Scheme for RSA Decryption in Internet of Things. IEEE Internet Things J. 7(8): 6868-6881 (2020) - [j59]Hongjun Li, Jia Yu, Hanlin Zhang, Ming Yang, Huaqun Wang:
Privacy-Preserving and Distributed Algorithms for Modular Exponentiation in IoT With Edge Computing Assistance. IEEE Internet Things J. 7(9): 8769-8779 (2020) - [j58]Chunyi Zhou, Anmin Fu, Shui Yu, Wei Yang, Huaqun Wang, Yuqing Zhang:
Privacy-Preserving Federated Learning in Fog Computing. IEEE Internet Things J. 7(11): 10782-10793 (2020) - [j57]Zhiyan Xu, Debiao He, Huaqun Wang, Pandi Vijayakumar, Kim-Kwang Raymond Choo:
A novel proxy-oriented public auditing scheme for cloud-based medical cyber physical systems. J. Inf. Secur. Appl. 51: 102453 (2020) - [j56]Si Chen, Anmin Fu, Jian Shen, Shui Yu, Huaqun Wang, Huaijiang Sun:
RNN-DP: A new differential privacy scheme base on Recurrent Neural Network for Dynamic trajectory privacy protection. J. Netw. Comput. Appl. 168: 102736 (2020) - [j55]Qi Feng, Debiao He, Huaqun Wang, Neeraj Kumar, Kim-Kwang Raymond Choo:
White-Box Implementation of Shamir's Identity-Based Signature Scheme. IEEE Syst. J. 14(2): 1820-1829 (2020) - [j54]Linzhi Jiang, Chunxiang Xu, Xiaofang Wang, Bo Luo, Huaqun Wang:
Secure outsourcing SIFT: Efficient and Privacy-Preserving Image Feature Extraction in the Encrypted Domain. IEEE Trans. Dependable Secur. Comput. 17(1): 179-193 (2020) - [j53]Huaqun Wang, Debiao He, Zhe Liu, Rui Guo:
Blockchain-Based Anonymous Reporting Scheme With Anonymous Rewarding. IEEE Trans. Engineering Management 67(4): 1514-1524 (2020) - [j52]Qi Feng, Debiao He, Zhe Liu, Huaqun Wang, Kim-Kwang Raymond Choo:
SecureNLP: A System for Multi-Party Privacy-Preserving Natural Language Processing. IEEE Trans. Inf. Forensics Secur. 15: 3709-3721 (2020) - [j51]Huaqun Wang, Debiao He, Jinguang Han:
VOD-ADAC: Anonymous Distributed Fine-Grained Access Control Protocol with Verifiable Outsourced Decryption in Public Cloud. IEEE Trans. Serv. Comput. 13(3): 572-583 (2020) - [j50]Biwen Chen, Libing Wu, Huaqun Wang, Lu Zhou, Debiao He:
A Blockchain-Based Searchable Public-Key Encryption With Forward and Backward Privacy for Cloud-Assisted Vehicular Social Networks. IEEE Trans. Veh. Technol. 69(6): 5813-5825 (2020) - [c16]Zheng Lian, Mang Su, Anmin Fu, Huaqun Wang, Chunyi Zhou:
Proxy Re-Encryption Scheme For Complicated Access Control Factors Description in Hybrid Cloud. ICC 2020: 1-6 - [c15]Xianglong Zhang, Anmin Fu, Huaqun Wang, Chunyi Zhou, Zhenzhu Chen:
A Privacy-Preserving and Verifiable Federated Learning Scheme. ICC 2020: 1-6 - [i2]Anmin Fu, Xianglong Zhang, Naixue Xiong, Yansong Gao, Huaqun Wang:
VFL: A Verifiable Federated Learning with Privacy-Preserving for Big Data in Industrial IoT. CoRR abs/2007.13585 (2020)
2010 – 2019
- 2019
- [j49]Yong Wang, Aiqing Zhang, Peiyun Zhang, Huaqun Wang:
Cloud-Assisted EHR Sharing With Security and Privacy Preservation via Consortium Blockchain. IEEE Access 7: 136704-136719 (2019) - [j48]Qi Li, Hongbo Zhu, Jinbo Xiong, Ruo Mo, Zuobin Ying, Huaqun Wang:
Fine-grained multi-authority access control in IoT-enabled mHealth. Ann. des Télécommunications 74(7-8): 389-400 (2019) - [j47]Huaqun Wang, Qihua Wang, Debiao He, Qi Li, Zhe Liu:
BBARS: Blockchain-Based Anonymous Rewarding Scheme for V2G Networks. IEEE Internet Things J. 6(2): 3676-3687 (2019) - [j46]Mimi Ma, Debiao He, Huaqun Wang, Neeraj Kumar, Kim-Kwang Raymond Choo:
An Efficient and Provably Secure Authenticated Key Agreement Protocol for Fog-Based Vehicular Ad-Hoc Networks. IEEE Internet Things J. 6(5): 8065-8075 (2019) - [j45]Huaqun Wang, Debiao He, Jia Yu:
Privacy-preserving incentive and rewarding scheme for crowd computing in social media. Inf. Sci. 470: 15-27 (2019) - [j44]Shaohui Wang, Yanxuan Zhang, Huaqun Wang, Fu Xiao, Ruchuan Wang:
抗内部关键词猜测攻击的高效公钥可搜索加密方案 (Efficient Public-key Searchable Encryption Scheme Against Inside Keyword Guessing Attack). 计算机科学 46(7): 91-95 (2019) - [j43]Qihua Wang, Huaqun Wang, Yufeng Wang, Rui Guo:
A Distributed Access Control with Outsourced Computation in Fog Computing. Secur. Commun. Networks 2019: 6782753:1-6782753:10 (2019) - [j42]Huaqun Wang, Debiao He, Jia Yu, Zhiwei Wang:
Incentive and Unconditionally Anonymous Identity-Based Public Provable Data Possession. IEEE Trans. Serv. Comput. 12(5): 824-835 (2019) - 2018
- [j41]Huaqun Wang:
Anonymous Data Sharing Scheme in Public Cloud and Its Application in E-Health Record. IEEE Access 6: 27818-27826 (2018) - [j40]Feng Wang, Li Xu, Huaqun Wang, Zhide Chen:
Identity-based non-repudiable dynamic provable data possession in cloud storage. Comput. Electr. Eng. 69: 521-533 (2018) - [j39]Huaqun Wang, Zhiwei Wang, Josep Domingo-Ferrer:
Anonymous and secure aggregation scheme in fog-based public cloud computing. Future Gener. Comput. Syst. 78: 712-719 (2018) - [j38]Huaqun Wang, Debiao He, Yanfei Sun, Neeraj Kumar, Kim-Kwang Raymond Choo:
PAT: A precise reward scheme achieving anonymity and traceability for crowdcomputing in public clouds. Future Gener. Comput. Syst. 79: 262-270 (2018) - [j37]Qi Feng, Debiao He, Sherali Zeadally, Huaqun Wang:
Anonymous biometrics-based authentication scheme with key distribution for mobile multi-server environment. Future Gener. Comput. Syst. 84: 239-251 (2018) - [j36]Guoxiu Liu, Geng Yang, Huaqun Wang, Yang Xiang, Hua Dai:
A Novel Secure Scheme for Supporting Complex SQL Queries over Encrypted Databases in Cloud Computing. Secur. Commun. Networks 2018: 7383514:1-7383514:15 (2018) - [j35]Debiao He, Neeraj Kumar, Huaqun Wang, Lina Wang, Kim-Kwang Raymond Choo, Alexey V. Vinel:
A Provably-Secure Cross-Domain Handshake Scheme with Symptoms-Matching for Mobile Healthcare Social Network. IEEE Trans. Dependable Secur. Comput. 15(4): 633-645 (2018) - [j34]Debiao He, Neeraj Kumar, Sherali Zeadally, Huaqun Wang:
Certificateless Provable Data Possession Scheme for Cloud-Based Smart Grid Data Management Systems. IEEE Trans. Ind. Informatics 14(3): 1232-1241 (2018) - [j33]Qihua Wang, Fagen Li, Huaqun Wang:
An Anonymous Multireceiver with Online/Offline Identity-Based Encryption. Wirel. Commun. Mob. Comput. 2018: 5702068:1-5702068:10 (2018) - [j32]Ximeng Liu, Yang Yang, Kim-Kwang Raymond Choo, Huaqun Wang:
Security and Privacy Challenges for Internet-of-Things and Fog Computing. Wirel. Commun. Mob. Comput. 2018: 9373961:1-9373961:3 (2018) - 2017
- [j31]Xiaoyu Li, Shaohua Tang, Lingling Xu, Huaqun Wang, Jie Chen:
Two-Factor Data Access Control With Efficient Revocation for Multi-Authority Cloud Storage Systems. IEEE Access 5: 393-405 (2017) - [j30]Debiao He, Neeraj Kumar, Huaqun Wang, Lina Wang, Kim-Kwang Raymond Choo:
Privacy-preserving certificateless provable data possession scheme for big data storage on cloud. Appl. Math. Comput. 314: 31-43 (2017) - [j29]Debiao He, Sherali Zeadally, Libing Wu, Huaqun Wang:
Analysis of handover authentication protocols for mobile wireless networks using identity-based public key cryptography. Comput. Networks 128: 154-163 (2017) - [j28]Hongyu Liu, Yi Mu, Jining Zhao, Chunxiang Xu, Huaqun Wang, Leiting Chen, Yong Yu:
Identity-based provable data possession revisited: Security analysis and generic construction. Comput. Stand. Interfaces 54: 10-19 (2017) - [j27]Huaqun Wang, Debiao He, Shibing Zhang:
Balanced anonymity and traceability for outsourcing small-scale data linear aggregation in the smart grid. IET Inf. Secur. 11(3): 131-138 (2017) - [j26]Debiao He, Huaqun Wang, Jianhong Zhang, Lina Wang:
Insecurity of an identity-based public auditing protocol for the outsourced data in cloud storage. Inf. Sci. 375: 48-53 (2017) - [j25]Yong Li, Ge Yao, Huaqun Wang, Changlu Lin:
Large Branching Tree Based Dynamic Provable Data Possession Scheme. J. Inf. Sci. Eng. 33(3): 653-673 (2017) - [j24]Debiao He, Huaqun Wang, Lina Wang, Jian Shen, Xianzhao Yang:
Efficient certificateless anonymous multi-receiver encryption scheme for mobile devices. Soft Comput. 21(22): 6801-6810 (2017) - [j23]Qihua Wang, Fanzhi Kong, Meng Wang, Huaqun Wang:
Optimized Charging Scheduling with Single Mobile Charger for Wireless Rechargeable Sensor Networks. Symmetry 9(11): 285 (2017) - [j22]Jia Yu, Huaqun Wang:
Strong Key-Exposure Resilient Auditing for Secure Cloud Storage. IEEE Trans. Inf. Forensics Secur. 12(8): 1931-1940 (2017) - [j21]Debiao He, Sherali Zeadally, Huaqun Wang, Qin Liu:
Lightweight Data Aggregation Scheme against Internal Attackers in Smart Grid Using Elliptic Curve Cryptography. Wirel. Commun. Mob. Comput. 2017 (2017) - 2016
- [j20]Huaqun Wang, Keqiu Li, Kaoru Ota, Jian Shen:
Remote Data Integrity Checking and Sharing in Cloud-Based Health Internet of Things. IEICE Trans. Inf. Syst. 99-D(8): 1966-1973 (2016) - [j19]Debiao He, Huaqun Wang, Muhammad Khurram Khan, Lina Wang:
Lightweight anonymous key distribution scheme for smart grid using elliptic curve cryptography. IET Commun. 10(14): 1795-1802 (2016) - [j18]Qihua Wang, Chang Wu Yu, Fagen Li, Huaqun Wang, Lijie Cao:
A group key-policy attribute-based encryption with partial outsourcing decryption in wireless sensor networks. Secur. Commun. Networks 9(17): 4138-4150 (2016) - [j17]Huaqun Wang, Debiao He, Shaohua Tang:
Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud. IEEE Trans. Inf. Forensics Secur. 11(6): 1165-1176 (2016) - [c14]Ge Yao, Yong Li, Linan Lei, Huaqun Wang, Changlu Lin:
An Efficient Dynamic Provable Data Possession Scheme in Cloud Storage. GPC 2016: 63-81 - [c13]Changfeng Li, Huaqun Wang:
Efficient Dynamic Provable Data Possession from Dynamic Binary Tree. ProvSec 2016: 101-111 - 2015
- [j16]Huaqun Wang:
Anonymous multi-receiver remote data retrieval for pay-TV in public clouds. IET Inf. Secur. 9(2): 108-118 (2015) - [j15]Huaqun Wang, Bo Qin, Qianhong Wu, Li Xu, Josep Domingo-Ferrer:
TPP: Traceable Privacy-Preserving Communication and Precise Reward for Vehicle-to-Grid Networks in Smart Grids. IEEE Trans. Inf. Forensics Secur. 10(11): 2340-2351 (2015) - [j14]Huaqun Wang:
Identity-Based Distributed Provable Data Possession in Multicloud Storage. IEEE Trans. Serv. Comput. 8(2): 328-340 (2015) - [c12]Huaqun Wang, Debiao He:
Proxy Provable Data Possession with General Access Structure in Public Clouds. Inscrypt 2015: 283-300 - [c11]Huaqun Wang, Jiguo Li:
Private Certificate-Based Remote Data Integrity Checking in Public Clouds. COCOON 2015: 575-586 - 2014
- [j13]Huaqun Wang:
Insecurity of 'Improved Anonymous Multi-Receiver Identity-Based Encryption'. Comput. J. 57(4): 636-638 (2014) - [j12]Huaqun Wang, Qianhong Wu, Bo Qin, Josep Domingo-Ferrer:
Identity-based remote data possession checking in public clouds. IET Inf. Secur. 8(2): 114-121 (2014) - [j11]Huaqun Wang, Qianhong Wu, Bo Qin, Josep Domingo-Ferrer:
FRR: Fair remote retrieval of outsourced private medical records in electronic health networks. J. Biomed. Informatics 50: 226-233 (2014) - [j10]Huaqun Wang:
Signer-admissible strong designated verifier signature from bilinear pairings. Secur. Commun. Networks 7(2): 422-428 (2014) - [j9]Xuefeng Liu, Yuqing Zhang, Boyang Wang, Huaqun Wang:
An anonymous data aggregation scheme for smart grid systems. Secur. Commun. Networks 7(3): 602-610 (2014) - [j8]Huaqun Wang, Yuqing Zhang:
On the Knowledge Soundness of a Cooperative Provable Data Possession Scheme in Multicloud Storage. IEEE Trans. Parallel Distributed Syst. 25(1): 264-267 (2014) - [c10]Huaqun Wang:
Provably Secure Anonymous Multi-receiver Identity-Based Encryption with Shorter Ciphertext. DASC 2014: 85-90 - [c9]Huaqun Wang, Qianhong Wu, Bo Qin, Futai Zhang, Josep Domingo-Ferrer:
A Provably Secure Ring Signature Scheme with Bounded Leakage Resilience. ISPEC 2014: 388-402 - [c8]Huaqun Wang:
Authentic and confidential policy distribution in software defined wireless network. IWCMC 2014: 1167-1171 - 2013
- [j7]Bo Qin, Huaqun Wang, Qianhong Wu, Jianwei Liu, Josep Domingo-Ferrer:
Simultaneous authentication and secrecy in identity-based data upload to cloud. Clust. Comput. 16(4): 845-859 (2013) - [j6]Huaqun Wang:
Proxy Provable Data Possession in Public Clouds. IEEE Trans. Serv. Comput. 6(4): 551-559 (2013) - 2012
- [j5]Huaqun Wang, Yi-Chun Zhang, Hu Xiong, Bo Qin:
Cryptanalysis and improvements of an anonymous multi-receiver identity-based encryption scheme. IET Inf. Secur. 6(1): 20-27 (2012) - [j4]Huaqun Wang, Bo Qin:
Improved one-to-many authentication scheme for access control in pay-TV systems. IET Inf. Secur. 6(4): 281-290 (2012) - [j3]Huaqun Wang, Yuqing Zhang:
On the Security of a Ticket-Based Anonymity System with Traceability Property in Wireless Mesh Networks. IEEE Trans. Dependable Secur. Comput. 9(3): 443-446 (2012) - [c7]Huaqun Wang, Bo Qin, Josep Domingo-Ferrer:
An Improved Binary Authentication Tree Algorithm for Vehicular Networks. INCoS 2012: 206-213 - [c6]Bo Qin, Huaqun Wang, Qianhong Wu, Jianwei Liu, Josep Domingo-Ferrer:
A New Identity Based Signcryption Scheme in the Standard Model. INCoS 2012: 606-611 - [c5]Huaqun Wang, Yuqing Zhang, Bo Qin:
Analysis and Improvements of Two Identity Based Anonymous Signcryption Schemes for Multiple Receivers. TrustCom 2012: 1057-1062 - 2011
- [j2]Huaqun Wang, Yuqing Zhang:
Cryptanalysis of an Efficient Threshold Self-Healing Key Distribution Scheme. IEEE Trans. Wirel. Commun. 10(1): 1-4 (2011) - [c4]Huaqun Wang, Yuqing Zhang:
Identity-Based Strong Key-Insulated Ring Signature Scheme in the Standard Model. MSN 2011: 451-455 - [i1]Xu An Wang, Liqiang Wu, Xiaoyuan Yang, Huaqun Wang:
Cryptanalysis and Improvement of an Efficient CCA Secure PKE Scheme. IACR Cryptol. ePrint Arch. 2011: 224 (2011)
2000 – 2009
- 2009
- [j1]Huaqun Wang, Futai Zhang, Yanfei Sun:
Cryptanalysis of a Generalized Ring Signature Scheme. IEEE Trans. Dependable Secur. Comput. 6(2): 149-151 (2009) - 2008
- [c3]Huaqun Wang, Changhui Deng, Shuping Zhao, Futai Zhang:
Cryptanalysis and Improvement of Shacham-Waters Ring Signature Scheme. CIS (2) 2008: 374-377 - [c2]Huaqun Wang, Hong Yu:
Cryptanalysis of Two Ring Signcryption Schemes. Inscrypt 2008: 41-46 - 2007
- [c1]Huaqun Wang, Shuping Zhao, Guoxing Jiang:
Key management based on elliptic curve Paillier scheme in ad hoc networks. SNPD (1) 2007: 116-119
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 21:29 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint